whatsapp-groupsex.wikaba.com
Open in
urlscan Pro
144.91.77.91
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On May 03 via api from GB
Summary
This is the only time whatsapp-groupsex.wikaba.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 144.91.77.91 144.91.77.91 | 51167 (CONTABO) (CONTABO) | |
6 | 1 |
ASN51167 (CONTABO, DE)
PTR: vmi367588.contaboserver.net
whatsapp-groupsex.wikaba.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
wikaba.com
whatsapp-groupsex.wikaba.com |
72 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | whatsapp-groupsex.wikaba.com |
whatsapp-groupsex.wikaba.com
|
6 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://whatsapp-groupsex.wikaba.com/login.php
Frame ID: 0054778B0F7AED8396A918B1847E544F
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
whatsapp-groupsex.wikaba.com/ |
1 KB 829 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SetyawanXD.css
whatsapp-groupsex.wikaba.com/css/ |
1 KB 766 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fb-atas.jpg
whatsapp-groupsex.wikaba.com/img/ |
29 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wa.jpg
whatsapp-groupsex.wikaba.com/img/ |
16 KB 16 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fb-bawah.jpg
whatsapp-groupsex.wikaba.com/img/ |
23 KB 23 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-fb.jpg
whatsapp-groupsex.wikaba.com/img/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
whatsapp-groupsex.wikaba.com
144.91.77.91
1156668a39eec335a9440aab54c6122bc319615ef534e4a0b236f1901fdd2000
162c7b9c00b790480993dbf31ad44b6b6827b7abfd3d70a6b8949d6021034b18
812a4f7414b9a7eb3ed41d5a21099851995f84789fedfaefc61d2c5eba43e434
99e2edb1e20e79f48ba0e2fee9cdfdfacad833f8b0f6cb2f1ab8eb16e877a2f1
e87a94d70687d5804a08ac22d6886d6b76207f4bc53685b4da2425e41d8d9fad
e975ea3aa5e760cd42aa3d77ee2033f3aff604d67fe0339000251582b5aa18c9