p2vq.16mb.com
Open in
urlscan Pro
185.224.138.131
Malicious Activity!
Public Scan
Submission: On April 14 via automatic, source phishtank
Summary
This is the only time p2vq.16mb.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 185.224.138.131 185.224.138.131 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 | 180.250.66.131 180.250.66.131 | 17974 (TELKOMNET...) (TELKOMNET-AS2-AP PT Telekomunikasi Indonesia) | |
1 | 118.97.116.2 118.97.116.2 | 17974 (TELKOMNET...) (TELKOMNET-AS2-AP PT Telekomunikasi Indonesia) | |
17 | 4 |
ASN17974 (TELKOMNET-AS2-AP PT Telekomunikasi Indonesia, ID)
PTR: 131.subnet180-250-66.speedy.telkom.net.id
p02.notifa.info |
ASN17974 (TELKOMNET-AS2-AP PT Telekomunikasi Indonesia, ID)
PTR: 2.subnet118-97-116.static.astinet.telkom.net.id
p01.notifa.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
16mb.com
p2vq.16mb.com |
92 KB |
2 |
notifa.info
p02.notifa.info p01.notifa.info |
993 B |
0 |
kikiowy.com
Failed
kikiowy.com Failed |
|
17 | 3 |
Domain | Requested by | |
---|---|---|
14 | p2vq.16mb.com |
p2vq.16mb.com
|
1 | p01.notifa.info |
p02.notifa.info
|
1 | p02.notifa.info |
p2vq.16mb.com
|
0 | kikiowy.com Failed |
p2vq.16mb.com
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://p2vq.16mb.com/facebook/
Frame ID: 06ADB4DB416F2BC22D229565A01905F0
Requests: 16 HTTP requests in this frame
Frame:
http://p01.notifa.info/campaign/log.php
Frame ID: E1321B8DBDF7CBB84673A1EF7058D783
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
p2vq.16mb.com/facebook/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
k7LsZ6Kzebp.css
p2vq.16mb.com/facebook/Facebook_files/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
RdxXuLZOwAp.css
p2vq.16mb.com/facebook/Facebook_files/ |
105 KB 33 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
INa-j1hStsU.css
p2vq.16mb.com/facebook/Facebook_files/ |
35 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
diMQkJ1Odg6.css
p2vq.16mb.com/facebook/Facebook_files/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1Vv4bii7bxR.css
p2vq.16mb.com/facebook/Facebook_files/ |
15 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IFFDgrjmTDl.htm
p2vq.16mb.com/facebook/Facebook_files/ |
216 B 429 B |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1j-MOx9XPgA.css
p2vq.16mb.com/facebook/Facebook_files/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
VLogo77go.css
p2vq.16mb.com/facebook/Facebook_files/ |
360 B 572 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
QSUIFyb0MPk.js
p2vq.16mb.com/facebook/Facebook_files/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
request.htm
p2vq.16mb.com/facebook/Facebook_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fbsecurity.png
p2vq.16mb.com/facebook/Facebook_files/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1514.jpg
p2vq.16mb.com/facebook/Facebook_files/ |
23 KB 23 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
request.htm
p2vq.16mb.com/facebook/Facebook_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
logo.png
kikiowy.com/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
request
p02.notifa.info/3fsmd3/ |
393 B 993 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log.php
p01.notifa.info/campaign/ Frame E132 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- kikiowy.com
- URL
- https://kikiowy.com/css/logo.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask number| __DEV__ function| define function| require function| requireDynamic function| requireLazy function| __d function| __e object| JX number| hasDeadImage object| MViewportPrelude function| Form1_Validator function| netbro_cache_analytics function| sync function| requestCfs function| loadFrame2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.notifa.info/ | Name: __cid Value: QDtoToTaUk%2BuGRLIUNpnK5gt9pY2eOYDCrZleA5tArUeXAKBOT6ZKN%2FDy1OYNaU9zbhYYfHZhrC2%2BR2uVEsNUbrrzgLu09GZCIWLH4HSiobZhi8R2d8movnGSsqXW%2BCp |
|
.notifa.info/ | Name: __bid Value: 68a1b0d02d496e17b2e8802afaea60637973f60c |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kikiowy.com
p01.notifa.info
p02.notifa.info
p2vq.16mb.com
kikiowy.com
118.97.116.2
180.250.66.131
185.224.138.131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