appe-ledgar.com
Open in
urlscan Pro
8.209.81.37
Malicious Activity!
Public Scan
Effective URL: https://appe-ledgar.com/
Submission: On June 04 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by R3 on May 30th 2023. Valid for: 3 months.
This is the only time appe-ledgar.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Ledger (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 185.105.110.5 185.105.110.5 | 210079 (EUROBYTE ...) (EUROBYTE Eurobyte LLC) | |
4 | 8.209.81.37 8.209.81.37 | 45102 (ALIBABA-C...) (ALIBABA-CN-NET Alibaba US Technology Co.) | |
4 | 2 |
ASN210079 (EUROBYTE Eurobyte LLC, RU)
PTR: isp102.mchost.ru
app-liadger.tech |
ASN45102 (ALIBABA-CN-NET Alibaba US Technology Co., Ltd., CN)
appe-ledgar.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
appe-ledgar.com
appe-ledgar.com |
201 KB |
1 |
app-liadger.tech
1 redirects
app-liadger.tech |
205 B |
4 | 2 |
Domain | Requested by | |
---|---|---|
4 | appe-ledgar.com |
appe-ledgar.com
|
1 | app-liadger.tech | 1 redirects |
4 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
ledgeer-login.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
appe-ledgar.com R3 |
2023-05-30 - 2023-08-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://appe-ledgar.com/
Frame ID: F6E4C4DE8B5A701EC1D2F9F9A92429E3
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Ledger Live WebPage URL History Show full URLs
-
http://app-liadger.tech/
HTTP 301
https://appe-ledgar.com/ Page URL
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://app-liadger.tech/
HTTP 301
https://appe-ledgar.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
appe-ledgar.com/ Redirect Chain
|
221 KB 164 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
729 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
37 KB 37 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
onboardvideo.mp4
appe-ledgar.com/img/ |
128 KB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
onboardvideo.mp4
appe-ledgar.com/img/ |
37 KB 37 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
onboardvideo.mp4
appe-ledgar.com/img/ |
3 MB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Ledger (Crypto Exchange)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| openlink0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app-liadger.tech
appe-ledgar.com
185.105.110.5
8.209.81.37
088d1bf639f9a9e3f2ca38cf1ea4c88002c79d6f3e4706868aa3d9f27208109f
13c19ec8ecbdb0854e61b191ea4f6a9820760381bf6ce39d4e18193a4b808ca5
39e72c0794c12f2dbb14a0f61ca946b535f795b1478fcf795bd26e5cb52ded34
8348db042c60679449e75ff57793ef1bc2d7c4b875ed3dad30299d3210eb2a29
c39d4cb55bfcc647dff0043e19abba4af117c63428b0928afd101bb17d64b0fe
d183a396704dce3ca0bdebee7969912b0018b0cb6c2ae121e2f945267194e1d1