munroer.top
Open in
urlscan Pro
172.67.203.161
Malicious Activity!
Public Scan
Effective URL: https://munroer.top/_bullbund_alpha/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&n...
Submission: On July 16 via manual from US — Scanned from AU
Summary
TLS certificate: Issued by WE1 on June 23rd 2024. Valid for: 3 months.
This is the only time munroer.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 52.95.132.234 52.95.132.234 | 16509 (AMAZON-02) (AMAZON-02) | |
1 5 | 172.67.151.37 172.67.151.37 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.67.203.161 172.67.203.161 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 142.250.71.74 142.250.71.74 | 15169 (GOOGLE) (GOOGLE) | |
1 3 | 104.17.3.184 104.17.3.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 6 |
ASN16509 (AMAZON-02, US)
PTR: s3-r-w.ap-southeast-2.amazonaws.com
azanon.s3.ap-southeast-2.amazonaws.com |
ASN15169 (GOOGLE, US)
PTR: syd15s17-in-f10.1e100.net
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
pushordders.click
1 redirects
pushordders.click |
9 KB |
3 |
cloudflare.com
1 redirects
challenges.cloudflare.com — Cisco Umbrella Rank: 3877 |
15 KB |
2 |
amazonaws.com
azanon.s3.ap-southeast-2.amazonaws.com |
4 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 |
31 KB |
1 |
munroer.top
munroer.top |
847 B |
12 | 5 |
Domain | Requested by | |
---|---|---|
5 | pushordders.click |
1 redirects
azanon.s3.ap-southeast-2.amazonaws.com
pushordders.click |
3 | challenges.cloudflare.com |
1 redirects
munroer.top
challenges.cloudflare.com |
2 | azanon.s3.ap-southeast-2.amazonaws.com | |
1 | ajax.googleapis.com |
munroer.top
|
1 | munroer.top |
pushordders.click
|
12 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3-ap-southeast-2.amazonaws.com Amazon RSA 2048 M01 |
2024-05-10 - 2025-05-01 |
a year | crt.sh |
pushordders.click WE1 |
2024-06-22 - 2024-09-20 |
3 months | crt.sh |
munroer.top WE1 |
2024-06-23 - 2024-09-21 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-06-24 - 2024-09-16 |
3 months | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://munroer.top/_bullbund_alpha/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null
Frame ID: BA3500098D16266E1A8229CAF8BAD6CE
Requests: 11 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/24kqb/0x4AAAAAAAEWIpby81ba-muQ/auto/fbE/normal/auto/
Frame ID: 5318760DFCCB2DD1B9F67EFB40F79824
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://azanon.s3.ap-southeast-2.amazonaws.com/control_astadem.html?page=_wetransfer2&pcnt=3 Page URL
- https://pushordders.click/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_... Page URL
-
https://pushordders.click/cdn-cgi/phish-bypass?atok=In5pEtTNfPxeFQHYShv2udTKSQJ6X_1yVpsp5Dc3guQ-172115...
HTTP 301
https://pushordders.click/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_... Page URL
- https://munroer.top/_bullbund_alpha/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://azanon.s3.ap-southeast-2.amazonaws.com/control_astadem.html?page=_wetransfer2&pcnt=3 Page URL
- https://pushordders.click/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null Page URL
-
https://pushordders.click/cdn-cgi/phish-bypass?atok=In5pEtTNfPxeFQHYShv2udTKSQJ6X_1yVpsp5Dc3guQ-1721151292-0.0.1.1-%2Fcontrol_astadem%2F%3Flogin%3D%26page%3D_wetransfer2%26request_type%3Dnull%26page_bg%3Dnull%26no_redrct%3Dnull%26pcnt%3D3%26no_psplash%3Dnull%26pmax%3Dnull%26vcnt%3Dnull%26use_cdtimr%3Dnull
HTTP 301
https://pushordders.click/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null Page URL
- https://munroer.top/_bullbund_alpha/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 6- https://pushordders.click/cdn-cgi/phish-bypass?atok=In5pEtTNfPxeFQHYShv2udTKSQJ6X_1yVpsp5Dc3guQ-1721151292-0.0.1.1-%2Fcontrol_astadem%2F%3Flogin%3D%26page%3D_wetransfer2%26request_type%3Dnull%26page_bg%3Dnull%26no_redrct%3Dnull%26pcnt%3D3%26no_psplash%3Dnull%26pmax%3Dnull%26vcnt%3Dnull%26use_cdtimr%3Dnull HTTP 301
- https://pushordders.click/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null
- https://challenges.cloudflare.com/turnstile/v0/api.js HTTP 302
- https://challenges.cloudflare.com/turnstile/v0/g/7a55c9ccbaaa/api.js
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
control_astadem.html
azanon.s3.ap-southeast-2.amazonaws.com/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
control_astadem.html
azanon.s3.ap-southeast-2.amazonaws.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
azanon.s3.ap-southeast-2.amazonaws.com/ |
243 B 520 B |
Other
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
pushordders.click/control_astadem/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
pushordders.click/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
pushordders.click/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
pushordders.click/control_astadem/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
pushordders.click/control_astadem/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
munroer.top/_bullbund_alpha/ |
729 B 847 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.3/ |
88 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
challenges.cloudflare.com/turnstile/v0/g/7a55c9ccbaaa/ Redirect Chain
|
43 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/24kqb/0x4AAAAAAAEWIpby81ba-muQ/auto/fbE/normal/auto/ Frame 5318 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- azanon.s3.ap-southeast-2.amazonaws.com
- URL
- https://azanon.s3.ap-southeast-2.amazonaws.com/control_astadem.html?page=_wetransfer2&pcnt=3
- Domain
- pushordders.click
- URL
- https://pushordders.click/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| javascriptCallback object| turnstile1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pushordders.click/ | Name: __cf_mw_byp Value: In5pEtTNfPxeFQHYShv2udTKSQJ6X_1yVpsp5Dc3guQ-1721151292-0.0.1.1-/control_astadem/?login=&page=_wetransfer2&request_type=null&page_bg=null&no_redrct=null&pcnt=3&no_psplash=null&pmax=null&vcnt=null&use_cdtimr=null |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
azanon.s3.ap-southeast-2.amazonaws.com
challenges.cloudflare.com
munroer.top
pushordders.click
azanon.s3.ap-southeast-2.amazonaws.com
pushordders.click
104.17.3.184
142.250.71.74
172.67.151.37
172.67.203.161
52.95.132.234
2271af8ff6f1c56da8f690185bc866c46d705e1b5a38777475fe82e2b2669b90
36f55be1584af707b1e0118862695779996035edbd9abedbe3631a9954c61be2
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
a678345ba12a0d76cab9fdf02b3e8c8d2f55e328aa776e58c5d6b44c931c15d7
a6f3f0faea4b3d48e03176341bef0ed3151ffbf226d4c6635f1c6039c0500575
d6b8c86f869c72217b0d32ec08e07eb244ed52d290306de88b47df9ce7a544de
de7d1e230009b19b7bbef1d1b1a7bea78e8ae39f428eb1bde0e84f0a2119fc8a
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016