fttunh.top
Open in
urlscan Pro
154.12.32.5
Malicious Activity!
Public Scan
Submission: On September 14 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 11th 2023. Valid for: 3 months.
This is the only time fttunh.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 154.12.32.5 154.12.32.5 | 35251 (NETLAB) (NETLAB) | |
6 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
wboluo.com
www.wboluo.com |
25 KB |
6 |
fttunh.top
fttunh.top |
466 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
6 | www.wboluo.com |
fttunh.top
|
6 | fttunh.top |
fttunh.top
|
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
aosfzkxvb.top R3 |
2023-09-11 - 2023-12-10 |
3 months | crt.sh |
*.wboluo.com GTS CA 1P5 |
2023-09-11 - 2023-12-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fttunh.top/
Frame ID: A56FC90060640AA9AFB2176D654F0734
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
fttunh.top/ |
757 B 988 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.d25f0563.css
fttunh.top/css/ |
235 KB 45 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.ba4f7857.js
fttunh.top/js/ |
956 KB 309 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
web.974a91cd.js
fttunh.top/js/ |
11 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
walid
www.wboluo.com/whatsapp/ |
46 B 525 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.png
fttunh.top/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tutorial.png
fttunh.top/img/ |
103 KB 103 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qrcode
www.wboluo.com/whatsapp/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
walid
www.wboluo.com/whatsapp/ |
20 B 349 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
qrcode
www.wboluo.com/whatsapp/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
walid
www.wboluo.com/whatsapp/ |
20 B 500 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
qrcode
www.wboluo.com/whatsapp/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| webpackJsonp function| _0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fttunh.top
www.wboluo.com
154.12.32.5
2a06:98c1:3121::3
03de723d516dde78af3b0aa3ca9aafd33cc426450db5e8a1cac0950d03ff17d2
0dbbb83e6bdc773ee2130cbf723d4d94f5826409e8e5d60f91c932621b0be643
1bebba22cabbfd8e999e53d35ecb55b8cb82a9e928eed9ed10f9160ba1154e45
3899581abcfed9b40b7208bbbca8bdbfe3ae9655980dbf55f04dec9cb3309f27
674870779eff5f94fd955c6dbd6ce33b1237e2fec4408b8a2534ea0ccbf29a06
6d026c2709296a28bed443f1948554abf8676ce4f8eecb5a58487fd5f0c103ee
96b2f9cb3ae498c17baaacac6e9a2f2f3e8e382c36ec8985e733e5a92aeebf8e
9e8f1f462cf2db1c95a708fbd946141a9aa34100b969634fe7d7a24eb940d085
ae9fdf03babdb5d050f36a651732a29128377217d38d08a17d7157d056a1960b
b8ec5d902cc9fe345b625fc404ec5fd775b2e16d3101d50239e684be7c9b7c25