msgg-serves.surge.sh
Open in
urlscan Pro
159.203.50.177
Malicious Activity!
Public Scan
Effective URL: https://msgg-serves.surge.sh/?uri=go
Submission: On March 14 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on April 23rd 2023. Valid for: a year.
This is the only time msgg-serves.surge.sh was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Orange (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 3 | 68.178.149.194 68.178.149.194 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
3 | 159.203.50.177 159.203.50.177 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 13.32.99.33 13.32.99.33 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 162.19.58.161 162.19.58.161 | 16276 (OVH) (OVH) | |
7 | 3 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
PTR: 194.149.178.68.host.secureserver.net
divsly.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-99-33.fra60.r.cloudfront.net
openfpcdn.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 11855 |
50 KB |
3 |
surge.sh
msgg-serves.surge.sh |
53 KB |
3 |
divsly.com
3 redirects
divsly.com |
432 B |
1 |
openfpcdn.io
openfpcdn.io — Cisco Umbrella Rank: 20224 |
5 KB |
7 | 4 |
Domain | Requested by | |
---|---|---|
3 | i.ibb.co | |
3 | msgg-serves.surge.sh |
msgg-serves.surge.sh
|
3 | divsly.com | 3 redirects |
1 | openfpcdn.io |
msgg-serves.surge.sh
|
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.surge.sh Sectigo RSA Domain Validation Secure Server CA |
2023-04-23 - 2024-05-18 |
a year | crt.sh |
openfpcdn.io Amazon RSA 2048 M02 |
2023-12-27 - 2025-01-25 |
a year | crt.sh |
ibb.co R3 |
2024-02-07 - 2024-05-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://msgg-serves.surge.sh/?uri=go
Frame ID: 917C701A691671390B28AAD4B7997203
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Identifiez-vousPage URL History Show full URLs
-
http://divsly.com/4zLgE
HTTP 302
https://divsly.com/4zLgE HTTP 302
https://divsly.com/pQika HTTP 302
https://msgg-serves.surge.sh/?uri=go Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://divsly.com/4zLgE
HTTP 302
https://divsly.com/4zLgE HTTP 302
https://divsly.com/pQika HTTP 302
https://msgg-serves.surge.sh/?uri=go Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
msgg-serves.surge.sh/ Redirect Chain
|
546 B 985 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.828c730a.js
msgg-serves.surge.sh/static/js/ |
154 KB 49 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.ed8470a3.css
msgg-serves.surge.sh/static/css/ |
8 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v1
openfpcdn.io/botd/ |
15 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
i.ibb.co/LnPhyQX/ |
154 B 397 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img.png
i.ibb.co/Xpwn492/ |
41 KB 41 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image.png
i.ibb.co/LxMg6R0/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Orange (Telecommunication)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
divsly.com
i.ibb.co
msgg-serves.surge.sh
openfpcdn.io
13.32.99.33
159.203.50.177
162.19.58.161
68.178.149.194
06a89873f4eb2ccd1bc1a17e110527144dfa40ce1e7890a6b74c314034d56fd1
5c9dd76fcf98815c4943596fd37ea4ca030708222f057cd87595efedc26eee08
7f6323c5aa3c282b7ae14dd45ea39970eb92c76d20f9852007e8fcd18115e45b
d19e3ecb996b1a18a5fbb8084ad4ae73fbdd62337f0d00f6863fe926d906a5e4
d2c2b5dcb89fe90e81c1f1e03cb8690ce6a4051fc17fa14b5f9ae1b7bfd3bac2
d52de7061d1938b86c5e1bd487206537a4d590fe6fec268835fe62bc94e41bfa
f2b517123135e30e3c7b33039d29985b76b96b026e53f6d1776eb9ed4929bd8a