mcaf2020.online
Open in
urlscan Pro
2606:4700:30::6812:216c
Malicious Activity!
Public Scan
Submission: On October 20 via manual from JP
Summary
This is the only time mcaf2020.online was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2606:4700:30:... 2606:4700:30::6812:216c | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 151.101.60.193 151.101.60.193 | 54113 (FASTLY) (FASTLY - Fastly) | |
1 | 151.101.12.193 151.101.12.193 | 54113 (FASTLY) (FASTLY - Fastly) | |
13 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
mcaf2020.online |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
mcaf2020.online
mcaf2020.online |
303 KB |
2 |
imgur.com
1 redirects
imgur.com i.imgur.com |
9 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | mcaf2020.online |
mcaf2020.online
|
1 | i.imgur.com |
mcaf2020.online
|
1 | imgur.com | 1 redirects |
13 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
ripple-give.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.imgur.com DigiCert SHA2 Secure Server CA |
2018-12-14 - 2020-02-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://mcaf2020.online/
Frame ID: B5A4CA5FF3170CC5D79EE70A4A8C72D1
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Clipboard.js (Miscellaneous) Expand
Detected patterns
- script /clipboard(?:-([\d.]+))?(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Transactions
Search URL Search Domain Scan URL
Title: Comments (12)
Search URL Search Domain Scan URL
Title: 7278862 transactions
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 10- https://imgur.com/Ifru0Ec.jpg HTTP 301
- https://i.imgur.com/Ifru0Ec.jpg
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
mcaf2020.online/ |
61 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clipboard.min.js.download
mcaf2020.online/114,000%20XRP%20left_files/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
mcaf2020.online/114,000%20XRP%20left_files/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js.download
mcaf2020.online/114,000%20XRP%20left_files/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
overrides.min.css
mcaf2020.online/114,000%20XRP%20left_files/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shared.min.js.download
mcaf2020.online/114,000%20XRP%20left_files/ |
13 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
comments.css
mcaf2020.online/114,000%20XRP%20left_files/ |
151 KB 50 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blockchain.css
mcaf2020.online/114,000%20XRP%20left_files/ |
250 KB 39 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
payment-request.css
mcaf2020.online/114,000%20XRP%20left_files/ |
721 B 757 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-overrides.css
mcaf2020.online/114,000%20XRP%20left_files/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
check.png
mcaf2020.online/114,000%20XRP%20left_files/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Ifru0Ec.jpg
i.imgur.com/ Redirect Chain
|
8 KB 8 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
T1X5ZPT.gif
mcaf2020.online/114,000%20XRP%20left_files/ |
126 KB 126 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)71 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| Clipboard function| $ function| jQuery object| jQuery111106302347266183501 string| ADDRESS number| satoshi string| show_adv object| adv_rule object| symbol_XRP object| symbol_local object| symbol string| root string| resource undefined| war_checksum boolean| min boolean| isExtension string| APP_VERSION string| APP_NAME string| IMPORTED_APP_NAME string| IMPORTED_APP_VERSION function| stripHTML function| setLocalSymbol function| setXRPSymbol undefined| names undefined| ws undefined| reconnectInterval function| webSocketConnect function| BlockFromJSON function| TransactionFromJSON function| padStr function| dateToString function| parseURLQuery function| generateURL function| formatSatoshi function| convert function| formatXRP function| sShift function| formatSymbol function| formatMoney function| formatOutput function| toggleAdv function| setAdv function| calcMoney function| setupSymbolToggle function| toggleSymbol object| _sounds function| playSound function| setupToggle function| updateQueryString function| loadScript function| SetCookie function| getCookie object| MyStore function| wait function| txid_gen function| addr_gen function| starttr function| newtr function| updateTrans object| times function| setProgress boolean| stop_progress function| updateProgress boolean| exec_copy function| copyAddress function| selectText function| addrWidthResizer object| clipboard number| trans1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.mcaf2020.online/ | Name: __cfduid Value: d4870ee02202144b3e1dd18db619763581571615679 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
i.imgur.com
imgur.com
mcaf2020.online
151.101.12.193
151.101.60.193
2606:4700:30::6812:216c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