ylfwz.club
Open in
urlscan Pro
2606:4700:30::6812:3692
Malicious Activity!
Public Scan
Effective URL: http://ylfwz.club/VwLLBOjDYNYqkBeZrwebnow4/?phone=
Submission: On May 21 via api from GB
Summary
This is the only time ylfwz.club was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:30:... 2606:4700:30::6812:3692 | 13335 () () | |
2 | 205.185.208.52 205.185.208.52 | 20446 () () | |
2 | 209.197.3.15 209.197.3.15 | 20446 () () | |
4 | 2606:4700:30:... 2606:4700:30::6812:3792 | 13335 () () | |
1 | 2a00:1450:400... 2a00:1450:4001:824::200a | 15169 () () | |
14 | 6 |
ASN20446 (,)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
ylfwz.club
ylfwz.club |
265 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
22 KB |
2 |
jquery.com
code.jquery.com |
60 KB |
1 |
googleapis.com
fonts.googleapis.com |
2 KB |
14 | 4 |
Domain | Requested by | |
---|---|---|
9 | ylfwz.club |
ylfwz.club
|
2 | maxcdn.bootstrapcdn.com |
ylfwz.club
|
2 | code.jquery.com |
ylfwz.club
|
1 | fonts.googleapis.com |
ylfwz.club
|
14 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-04-30 - 2019-07-23 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
http://ylfwz.club/VwLLBOjDYNYqkBeZrwebnow4/?phone=
Frame ID: 2629612A290079F09B2131CA9E705349
Requests: 13 HTTP requests in this frame
Frame:
http://ylfwz.club/pc-error-0xxxmacxx88/beep.mp3
Frame ID: AA0A713E1E819B13C03AFD7CE5B8680B
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://ylfwz.club/ Page URL
- http://ylfwz.club/VwLLBOjDYNYqkBeZrwebnow4/?phone= Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://ylfwz.club/ Page URL
- http://ylfwz.club/VwLLBOjDYNYqkBeZrwebnow4/?phone= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
ylfwz.club/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
ylfwz.club/VwLLBOjDYNYqkBeZrwebnow4/ |
25 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-theme.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
23 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
ylfwz.club/pc-error-0xxxmacxx88/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
support.svg
ylfwz.club/pc-error-0xxxmacxx88/images/ |
16 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
335158-windows-8-window.png
ylfwz.club/pc-error-0xxxmacxx88/images/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
ylfwz.club/pc-error-0xxxmacxx88/js/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
33 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
ylfwz.club/pc-error-0xxxmacxx88/images/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
239 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
beep.mp3
ylfwz.club/pc-error-0xxxmacxx88/ Frame AA0A |
14 KB 0 |
Document
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
beep.mp3
ylfwz.club/pc-error-0xxxmacxx88/ Frame AA0A |
196 KB 196 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Tech Support Scam (Consumer)30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery boolean| isOpera boolean| isFirefox boolean| isSafari boolean| isChrome boolean| isIE function| getVariableFromURl function| fillForm function| closeCode function| getCode function| modalClose function| getModal function| _toggleFullScreen function| open1 function| isPlaying function| catchControlKeys function| prevent string| phone boolean| state function| confirmExit function| reloadIFrame function| get_browser boolean| InternetEx boolean| isIEedge object| browser undefined| msg_ff1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.ylfwz.club/ | Name: __cfduid Value: d366aa84743a8678656ce0d587859243a1558467610 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
maxcdn.bootstrapcdn.com
ylfwz.club
205.185.208.52
209.197.3.15
2606:4700:30::6812:3692
2606:4700:30::6812:3792
2a00:1450:4001:824::200a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