wasuliaery.xyz
Open in
urlscan Pro
2606:4700:30::681c:17f9
Malicious Activity!
Public Scan
Submission Tags: 6133452
Submission: On July 24 via api from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on July 9th 2019. Valid for: a year.
This is the only time wasuliaery.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 2606:4700:30:... 2606:4700:30::681c:17f9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1450:400... 2a00:1450:4001:817::2004 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
7 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
wasuliaery.xyz |
ASN15169 (GOOGLE - Google LLC, US)
www.google.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
wasuliaery.xyz
wasuliaery.xyz |
30 KB |
1 |
google.com
www.google.com |
674 B |
0 |
kerio.com
Failed
my.kerio.com Failed |
|
7 | 3 |
Domain | Requested by | |
---|---|---|
3 | wasuliaery.xyz |
wasuliaery.xyz
|
1 | www.google.com |
wasuliaery.xyz
|
0 | my.kerio.com Failed |
wasuliaery.xyz
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-07-09 - 2020-07-08 |
a year | crt.sh |
www.google.com Google Internet Authority G3 |
2019-06-18 - 2019-09-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://wasuliaery.xyz/UKSTKFURTKECGYFRIFO/FDJDRJTCEWCFWRTF/FUF675E36TUFDT3UYD67GFR/TI65I3T6VIYFEUYGEKWFUGFYKFU/JTRU67R5I236RT26RF6DT3IURTDD6I/2U54E56RE5U2356R67RT23UYDF267R23I/REE5623FU5R236R7T23R6D67TR2R/UYE35ERI67D3DRI237D52367DR23I6DT23/U6E56R2D3RV2F3E56RD32E6723RD2I3U6DT2/56E46EDCR4523E623RE237ED5R23U67D3T5/564E2356D4U2356D4DFR23YDRT32I/mailbox/IUWTYRI76TDITFG2IFUYDT/userarchive/redo.php?email=test@test.com
Frame ID: 120FCBFB37BA74C03BAC29BA1ADC5CA7
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
redo.php
wasuliaery.xyz/UKSTKFURTKECGYFRIFO/FDJDRJTCEWCFWRTF/FUF675E36TUFDT3UYD67GFR/TI65I3T6VIYFEUYGEKWFUGFYKFU/JTRU67R5I236RT26RF6DT3IURTDD6I/2U54E56RE5U2356R67RT23UYDF267R23I/REE5623FU5R236R7T23R6D67TR2R... |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
wasuliaery.xyz/UKSTKFURTKECGYFRIFO/FDJDRJTCEWCFWRTF/FUF675E36TUFDT3UYD67GFR/TI65I3T6VIYFEUYGEKWFUGFYKFU/JTRU67R5I236RT26RF6DT3IURTDD6I/2U54E56RE5U2356R67RT23UYDF267R23I/REE5623FU5R236R7T23R6D67TR2R... |
37 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
k_tr.js
my.kerio.com/static/translations/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
browser.js
my.kerio.com/static/widgets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
const.js
my.kerio.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opened-email-envelope.png
wasuliaery.xyz/UKSTKFURTKECGYFRIFO/FDJDRJTCEWCFWRTF/FUF675E36TUFDT3UYD67GFR/TI65I3T6VIYFEUYGEKWFUGFYKFU/JTRU67R5I236RT26RF6DT3IURTDD6I/2U54E56RE5U2356R67RT23UYDF267R23I/REE5623FU5R236R7T23R6D67TR2R... |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicons
www.google.com/s2/ |
300 B 674 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- my.kerio.com
- URL
- https://my.kerio.com/static/translations/k_tr.js
- Domain
- my.kerio.com
- URL
- https://my.kerio.com/static/widgets/browser.js
- Domain
- my.kerio.com
- URL
- https://my.kerio.com/const.js?v=BUILD_HASH
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
my.kerio.com
wasuliaery.xyz
www.google.com
my.kerio.com
2606:4700:30::681c:17f9
2a00:1450:4001:817::2004
177d2c95960f5e6432c2abf964f50cba3f40b5461a9523d4380ff4baf9e65242
858d2a042c3344cdf3d8c0f3ca3f6e865113421671c9cbba57ff7ab0f840cd73
b253478e5f8f64c347ed7f9c4634d981db25b5f0cd746ba59118462b6db3d92a
c382c6b4e91f47c890a6bd191b8d17136c7dcfed6014e86abd46c8aba1e2186b