intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
Open in
urlscan Pro
194.163.35.244
Malicious Activity!
Public Scan
Submission: On February 24 via api from JP — Scanned from JP
Summary
This is the only time intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 194.163.35.244 194.163.35.244 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2606:4700::68... 2606:4700::6810:5814 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2404:6800:400... 2404:6800:4004:820::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2404:6800:400... 2404:6800:4004:821::2003 | 15169 (GOOGLE) (GOOGLE) | |
11 | 6 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
tdkpdlidngnpruaknsiorgygpnti.link
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link |
11 KB |
1 |
gstatic.com
fonts.gstatic.com |
16 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 35 |
1 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2202 |
16 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 401 |
8 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 546 |
24 KB |
11 | 6 |
Domain | Requested by | |
---|---|---|
6 | intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link |
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
|
1 | stackpath.bootstrapcdn.com |
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
|
1 | cdn.jsdelivr.net |
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
|
1 | code.jquery.com |
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
|
11 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-07-03 - 2022-07-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/
Frame ID: 8A871D65F1BAFF2D09C9311D92BB93C8
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
SecurityDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
responsiveFB.css
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internationalFB.css
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logos_f.svg
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/img/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qu.gif
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link/img/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.slim.min.js
code.jquery.com/ |
71 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.1/dist/umd/ |
21 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.5.2/js/ |
59 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
11 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v29/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| mousedwn function| $ function| jQuery function| Popper object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
intlaoyu.tdkpdlidngnpruaknsiorgygpnti.link
stackpath.bootstrapcdn.com
194.163.35.244
2001:4de0:ac18::1:a:1a
2404:6800:4004:820::200a
2404:6800:4004:821::2003
2606:4700::6810:5814
2606:4700::6812:bcf
0eaeadb58e6995ba85eccb6198aaef77eeb1d4b66699e4e1f3fc10eb6adfcdb9
2de7e6ef9ab8992b2d9627f4ecd3964d7babf6740ddfc647dbc7587ad316ecb9
79c599dd760cec0c1621a1af49d9a2a49da5d45e1b37d4575bace0a5e0226582
7f8167edee007d82b26c7db2abb46ad5f549f7029d9b3a7c2983dec9d2a64a3b
832029b1ab7573a16f9e6aed6e619a110c04bd9e52dafc1c0ce846ed973544db
9114ab4a36c9208742372941d17fc1711de717ac0274faa3a4e29a915c02dd71
9531e96099e973b3d1c291f3e60419d8fe4730f46de8a492fccd2b4c962c96ce
967af6da4f23559cbb1b4e4887f6722cac6537e25486903625433b25a27cc585
e2fbdaee82379f3f1f82e43198ae53cebe2d6ad293d05f2109e9fb0acaa102a0
e3e5f35d586c0e6a9a9d7187687be087580c40a5f8d0e52f0c4053bbc25c98db
fe28dc38bc057f6eb11180235bbe458b3295a39b674d889075d3d9a0b5071d9f