www.getofferxnetwork.com Open in urlscan Pro
144.91.71.204  Malicious Activity! Public Scan

URL: http://www.getofferxnetwork.com/link/
Submission: On March 25 via automatic, source openphish

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 9 HTTP transactions. The main IP is 144.91.71.204, located in Nuremberg, Germany and belongs to CONTABO, DE. The main domain is www.getofferxnetwork.com.
This is the only time www.getofferxnetwork.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Chase (Banking)

Domain & IP information

IP Address AS Autonomous System
3 144.91.71.204 51167 (CONTABO)
9 2
Apex Domain
Subdomains
Transfer
3 getofferxnetwork.com
www.getofferxnetwork.com
251 KB
0 Failed
function sub() { [native code] }. Failed
9 2
Domain Requested by
3 www.getofferxnetwork.com www.getofferxnetwork.com
0 firebase Failed www.getofferxnetwork.com
9 2

This site contains links to these domains. Also see Links.

Domain
mjmezza.com.au
Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.getofferxnetwork.com/link/
Frame ID: 8CBA4358FC5FE041D06093D6EC12D2CE
Requests: 9 HTTP requests in this frame

Screenshot


Page Statistics

9
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

251 kB
Transfer

254 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.getofferxnetwork.com/link/
6 KB
2 KB
Document
General
Full URL
http://www.getofferxnetwork.com/link/
Protocol
HTTP/1.1
Server
144.91.71.204 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
host.white-dns.com
Software
/
Resource Hash
5dd3763f1ed769b0f0e3fcfcba63c2c98afad163454aceb99f8982c14013dec0

Request headers

Host
www.getofferxnetwork.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Type
text/html
Last-Modified
Wed, 24 Mar 2021 17:40:24 GMT
Accept-Ranges
bytes
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Length
1943
Date
Thu, 25 Mar 2021 02:13:59 GMT
firebase-app.js
firebase/7.15.1/
0
0

firebase-auth.js
firebase/7.15.1/
0
0

firebase-database.js
firebase/7.15.1/
0
0

firebase-messaging.js
firebase/7.15.1/
0
0

firebase-storage.js
firebase/7.15.1/
0
0

init.js
firebase/
0
0

Chase_Logo.gif
www.getofferxnetwork.com/link/
2 KB
2 KB
Image
General
Full URL
http://www.getofferxnetwork.com/link/Chase_Logo.gif
Requested by
Host: www.getofferxnetwork.com
URL: http://www.getofferxnetwork.com/link/
Protocol
HTTP/1.1
Server
144.91.71.204 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
host.white-dns.com
Software
/
Resource Hash
b1244280262f3f8246c7a89f516269f6cecb1aea6f1425078f5fd0886ff7029b

Request headers

Referer
http://www.getofferxnetwork.com/link/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 25 Mar 2021 02:13:59 GMT
Last-Modified
Sun, 18 Oct 2020 17:13:44 GMT
Content-Type
image/gif
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1914
Expires
Thu, 01 Apr 2021 02:13:59 GMT
ch.jpeg
www.getofferxnetwork.com/link/
246 KB
246 KB
Image
General
Full URL
http://www.getofferxnetwork.com/link/ch.jpeg
Requested by
Host: www.getofferxnetwork.com
URL: http://www.getofferxnetwork.com/link/
Protocol
HTTP/1.1
Server
144.91.71.204 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
host.white-dns.com
Software
/
Resource Hash
748d19968eceacc51b3e3cf884b508f55fac4636f24a02f69e4d72defdfda47c

Request headers

Referer
http://www.getofferxnetwork.com/link/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 25 Mar 2021 02:13:59 GMT
Last-Modified
Sun, 18 Oct 2020 17:19:28 GMT
Content-Type
image/jpeg
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
252002
Expires
Thu, 01 Apr 2021 02:13:59 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
firebase
URL
https://firebase/7.15.1/firebase-app.js
Domain
firebase
URL
https://firebase/7.15.1/firebase-auth.js
Domain
firebase
URL
https://firebase/7.15.1/firebase-database.js
Domain
firebase
URL
https://firebase/7.15.1/firebase-messaging.js
Domain
firebase
URL
https://firebase/7.15.1/firebase-storage.js
Domain
firebase
URL
https://firebase/init.js

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Chase (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

firebase
www.getofferxnetwork.com
firebase
144.91.71.204
5dd3763f1ed769b0f0e3fcfcba63c2c98afad163454aceb99f8982c14013dec0
748d19968eceacc51b3e3cf884b508f55fac4636f24a02f69e4d72defdfda47c
b1244280262f3f8246c7a89f516269f6cecb1aea6f1425078f5fd0886ff7029b