xinfinnetwork.org
Open in
urlscan Pro
2606:4700:3035::6815:285b
Malicious Activity!
Public Scan
Submission Tags: https://sinking.yachts sinking-yachts phishing Search All
Submission: On August 20 via api from CZ — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 19th 2024. Valid for: 3 months.
This is the only time xinfinnetwork.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 2606:4700:303... 2606:4700:3035::6815:285b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:80f::2003 | 15169 (GOOGLE) (GOOGLE) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
xinfinnetwork.org
1 redirects
xinfinnetwork.org |
11 KB |
2 |
gstatic.com
fonts.gstatic.com |
37 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
2 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
5 | xinfinnetwork.org |
1 redirects
xinfinnetwork.org
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
xinfinnetwork.org
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
xinfinnetwork.org WE1 |
2024-08-19 - 2024-11-17 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://xinfinnetwork.org/
Frame ID: B7CEAFDD8BF8D79DC531571288D5C8E4
Requests: 5 HTTP requests in this frame
Frame:
https://xinfinnetwork.org/cdn-cgi/challenge-platform/h/b/scripts/jsd/6790c32b9fc9/main.js
Frame ID: CB8199711D39D3B05815677C1E293C24
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://xinfinnetwork.org/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://xinfinnetwork.org/cdn-cgi/challenge-platform/h/b/scripts/jsd/6790c32b9fc9/main.js
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
xinfinnetwork.org/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
28 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
xinfinnetwork.org/cdn-cgi/challenge-platform/h/b/scripts/jsd/6790c32b9fc9/ Frame CB81 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8b6544a12bba65c9
xinfinnetwork.org/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame CB81 |
0 981 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
xinfinnetwork.org/ |
15 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
task.url
Submitted on
August 20th 2024, 8:52:45 pm
UTC —
From Czech Republic
Threats:
Phishing
Scam
Comment: This domain is present in the Sinking Yachts anti-phishing list. More Info: https://sinking.yachts
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.xinfinnetwork.org/ | Name: cf_clearance Value: Gv.LsDw2N2qnePTWVjquLVjXfH6rVd_QfgLkS6f27ZM-1724187156-1.2.1.1-JR6AR2w4HUc1FdGnbp5hPR15R87V7lU73sJIvhvar21nJOH8u7_Yy4hNWOAoCuUifZdXzC_UHylC5y0wWi.y.C6DqAkwFprYWsc2UgaIlsJnctgp6I3EdUR82dHIyhCBm0O8VFi7lwYByqXxmYXhEVp75EU4ZJQsuJM7J1akrhbE2d4ijkvD8r83nOtObIrRL80cnKI5vXBnPwG6bVvsX3yUVFjebbCLpgwYbl4E2Wit7NVzG5lhzHpCI7Z85jLM7McIdfZxFLEVJF_PmXHWB1MrHWOWnB7Q473hIJPd5SJGDwGzfiFAmG6XvX3AVNJiS7U.Y_imFVQnn40nXSv06R5nx4M2VEZnfRiluY8TSXjJQ1shbji7rAD9R.Zjrx28Q1L1ctK.FvwGKfGo6QHNb9PhvOaXQHG9xvjE9wwNQZ4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
xinfinnetwork.org
2606:4700:3035::6815:285b
2a00:1450:4001:809::200a
2a00:1450:4001:80f::2003
54c644549376739534b68566567c6c03abe197185bd54b3551e3c8db8c7eb832
760941868082b609221e5fcb27af485f16166366032aee96d3bf1a32d629acf3
89978e658e840b927dddb5cb3a835c7d8526ece79933bd9f3096b301fe1a8571
afdd76f6919dc340e54a1045e6f4a8fc840a922c8efd1d07cc5bcdf448373a66
be7bd9cae78f261bd17168d981b1603b5fa46b0ed1b6873deb71fb48a4aca6bb
d9bada3a44bb2ffa66dec5cc781cafc9ef17ed876cd9b0c5f7ef18228b63cebb
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855