accfb-qrw398wkt.mejling.si
Open in
urlscan Pro
212.44.106.23
Malicious Activity!
Public Scan
Submission: On May 21 via automatic, source openphish
Summary
This is the only time accfb-qrw398wkt.mejling.si was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 212.44.106.23 212.44.106.23 | 12637 (SEEWEB We...) (SEEWEB Web hosting) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a03:2880:f02... 2a03:2880:f02d:12:face:b00c:0:3 | 32934 (FACEBOOK) (FACEBOOK) | |
8 | 3 |
ASN12637 (SEEWEB Web hosting, colocation and cloud services, IT)
PTR: vps-kreativija.controlpanel.si
accfb-qrw398wkt.mejling.si |
ASN32934 (FACEBOOK, US)
static.xx.fbcdn.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
mejling.si
accfb-qrw398wkt.mejling.si |
123 KB |
1 |
fbcdn.net
static.xx.fbcdn.net |
2 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
21 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | accfb-qrw398wkt.mejling.si |
accfb-qrw398wkt.mejling.si
|
1 | static.xx.fbcdn.net |
accfb-qrw398wkt.mejling.si
|
1 | stackpath.bootstrapcdn.com |
accfb-qrw398wkt.mejling.si
|
8 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
m.facebook.com |
messenger.com |
facebook.com |
pay.facebook.com |
www.oculus.com |
portal.facebook.com |
lm.facebook.com |
developers.facebook.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2021-04-06 - 2021-07-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://accfb-qrw398wkt.mejling.si/connect.html?timelimit=0a355d5bf8da856f344043a219496200
Frame ID: 4A451EE1A8512C43DBCD7FB198EDD989
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
34 Outgoing links
These are links going to different origins than the main page.
Title: Notice You are required to Log In again in order to view the next page!
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Forgot Password?
Search URL Search Domain Scan URL
Title: Français (France)
Search URL Search Domain Scan URL
Title: Português (Brasil)
Search URL Search Domain Scan URL
Title: Italiano
Search URL Search Domain Scan URL
Title: Español
Search URL Search Domain Scan URL
Title: 中文(简体)
Search URL Search Domain Scan URL
Title: Deutsch
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title: About
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Title: Messanger
Search URL Search Domain Scan URL
Title: Facebook Lite
Search URL Search Domain Scan URL
Title: Watch
Search URL Search Domain Scan URL
Title: People
Search URL Search Domain Scan URL
Title: Pages
Search URL Search Domain Scan URL
Title: Page Categories
Search URL Search Domain Scan URL
Title: Places
Search URL Search Domain Scan URL
Title: Games
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Marketplace
Search URL Search Domain Scan URL
Title: Facebook Pay
Search URL Search Domain Scan URL
Title: Groups
Search URL Search Domain Scan URL
Title: Jobs
Search URL Search Domain Scan URL
Title: Oculus
Search URL Search Domain Scan URL
Title: Portal
Search URL Search Domain Scan URL
Title: Instagram
Search URL Search Domain Scan URL
Title: Local
Search URL Search Domain Scan URL
Title: Fundraisers
Search URL Search Domain Scan URL
Title: Services
Search URL Search Domain Scan URL
Title: Developers
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
connect.html
accfb-qrw398wkt.mejling.si/ |
15 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
53txlwvKeRS.css
accfb-qrw398wkt.mejling.si/connect_files/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
O3MUGuHC-nX.css
accfb-qrw398wkt.mejling.si/connect_files/ |
37 KB 38 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
y_XtUdqeKN-.css
accfb-qrw398wkt.mejling.si/connect_files/ |
49 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dF5SId3UHWd.svg
accfb-qrw398wkt.mejling.si/connect_files/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hsts-pixel.gif
accfb-qrw398wkt.mejling.si/connect_files/ |
43 B 228 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JJsC9S33ata.png
static.xx.fbcdn.net/rsrc.php/v3/yP/r/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
accfb-qrw398wkt.mejling.si/ | Name: PH_HPXY_CHECK Value: s1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
accfb-qrw398wkt.mejling.si
stackpath.bootstrapcdn.com
static.xx.fbcdn.net
212.44.106.23
2606:4700::6812:acf
2a03:2880:f02d:12:face:b00c:0:3
2ff5b959fa9f6b4b1d04d20a37d706e90039176ab1e2a202994d9580baeebfd6
39851cf509d8e6142c7e77cc2ee475c50ad358ca3be899954bf17c2155ae49ca
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
837a841d947230dc361bc2334a4e34ae9976b0fd2e6714d1c57a8a8f8c82ff81
9531e96099e973b3d1c291f3e60419d8fe4730f46de8a492fccd2b4c962c96ce
dfd4557cf10f1920c4363b5304bcdfe3e884ca415807a8b6c6b0f462c5f73d17
e99f06ccbe5da3be9f80050324f6840d802a7c16ef43ee6a082c15a868820c2e
fee797a6c5a83da83cf3e0532164c84bca0f910e50447ff29b7179d0438187cf