bxwan.xpz.my.id
Open in
urlscan Pro
2606:4700:3036::6815:145a
Malicious Activity!
Public Scan
Effective URL: https://bxwan.xpz.my.id/
Submission Tags: tweet @phishinghunter_ #facebook #phishing #alert #scam #scampage Search All
Submission: On March 16 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by GTS CA 1P5 on February 22nd 2023. Valid for: 3 months.
This is the only time bxwan.xpz.my.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 5 | 2606:4700:303... 2606:4700:3035::ac43:c007 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2606:4700:303... 2606:4700:3036::6815:145a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
xpz.my.id
2 redirects
bxwan.xpz.my.id |
32 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
13 | bxwan.xpz.my.id |
2 redirects
bxwan.xpz.my.id
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.xpz.my.id GTS CA 1P5 |
2023-02-22 - 2023-05-23 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://bxwan.xpz.my.id/
Frame ID: 36B9327FABDAC6E26D837F6A2D44E119
Requests: 8 HTTP requests in this frame
Frame:
https://bxwan.xpz.my.id/cdn-cgi/challenge-platform/h/g/scripts/cb/invisible.js?cb=7a8e79742daf95f6
Frame ID: FBE28FC9F3EB30ED22F7BF783244E28D
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
Index of /Page URL History Show full URLs
- http://bxwan.xpz.my.id/ Page URL
-
http://bxwan.xpz.my.id/cdn-cgi/phish-bypass?atok=jgvvAh9NzLo8H5n3M10_I2UIZVwnxY3GzsWEsmy6ONQ-167898...
HTTP 301
http://bxwan.xpz.my.id/ HTTP 301
https://bxwan.xpz.my.id/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://bxwan.xpz.my.id/ Page URL
-
http://bxwan.xpz.my.id/cdn-cgi/phish-bypass?atok=jgvvAh9NzLo8H5n3M10_I2UIZVwnxY3GzsWEsmy6ONQ-1678985204-0-%2F
HTTP 301
http://bxwan.xpz.my.id/ HTTP 301
https://bxwan.xpz.my.id/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
bxwan.xpz.my.id/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.errors.css
bxwan.xpz.my.id/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-exclamation.png
bxwan.xpz.my.id/cdn-cgi/images/ |
452 B 889 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
bxwan.xpz.my.id/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
autoindex.css
bxwan.xpz.my.id/_autoindex/assets/css/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tablesort.js
bxwan.xpz.my.id/_autoindex/assets/js/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tablesort.number.js
bxwan.xpz.my.id/_autoindex/assets/js/ |
682 B 626 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
folder-fill.svg
bxwan.xpz.my.id/_autoindex/assets/icons/ |
591 B 863 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
invisible.js
bxwan.xpz.my.id/cdn-cgi/challenge-platform/h/g/scripts/cb/ Frame FBE2 |
26 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pica.js
bxwan.xpz.my.id/cdn-cgi/challenge-platform/h/g/scripts/ Frame FBE2 |
7 KB 4 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
7a8e79742daf95f6
bxwan.xpz.my.id/cdn-cgi/challenge-platform/h/g/cv/result/ Frame FBE2 |
2 B 657 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless function| Tablesort2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bxwan.xpz.my.id/ | Name: __cf_mw_byp Value: jgvvAh9NzLo8H5n3M10_I2UIZVwnxY3GzsWEsmy6ONQ-1678985204-0-/ |
|
.xpz.my.id/ | Name: __cf_bm Value: wVgBa0c7f0gJL9bKvZSrSX5F_XivdEccm0sq1Us3ZtY-1678985210-0-AWESOhhF1uiWpHQQpUEm84o7rwO1gq6fajiYFNVxTe63bzxI9Ckqsks4DB0m+/0iOVrdqLqnYkOMi3soANTMMbXi7URgc+XWmBxvlEyYnUMcl9K7BRKVCtK6v6zr1+SWZA== |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bxwan.xpz.my.id
2606:4700:3035::ac43:c007
2606:4700:3036::6815:145a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