www.alexfarm-eg.co
Open in
urlscan Pro
91.234.99.247
Malicious Activity!
Public Scan
Submission: On December 02 via automatic, source openphish
Summary
This is the only time www.alexfarm-eg.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 91.234.99.247 91.234.99.247 | 48666 (AS-MAROSN...) (AS-MAROSNET Moscow) | |
5 | 1 |
ASN48666 (AS-MAROSNET Moscow, Russia, RU)
PTR: na.nirjonmela.com
www.alexfarm-eg.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
alexfarm-eg.co
www.alexfarm-eg.co |
263 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | www.alexfarm-eg.co |
www.alexfarm-eg.co
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.alexfarm-eg.co/c/o/m/p/o/n/e/n/t/s/
Frame ID: 120A07677BC590E84B251485D88F2CEE
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.alexfarm-eg.co/c/o/m/p/o/n/e/n/t/s/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.alexfarm-eg.co/c/o/m/p/o/n/e/n/t/s/images/ |
555 B 795 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
www.alexfarm-eg.co/c/o/m/p/o/n/e/n/t/s/images/ |
235 KB 236 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
exceleform.png
www.alexfarm-eg.co/c/o/m/p/o/n/e/n/t/s/images/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
294.gif
www.alexfarm-eg.co/c/o/m/p/o/n/e/n/t/s/images/ |
7 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Excel / PDF download (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| init0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.alexfarm-eg.co
91.234.99.247
209c1304bee07ef3c75f91235d6303242d5f9787fe36c368a08de2753ac8f701
5366f4dfa21c7a2607a96523575dd2b96a321af2f8a9313f5b84f31c29fbadff
9c2ecd912226d6e27eebc9dbcce167f3e1e84213e42d9b2d05ce58e79d07137c
dee9e81aedbcfb339fcc8db727103477f1d3e9cedbea84412492a51201cdbbdd
fef58f4d384c2763c7be72b7df1180f9e4a0c64f128659fb3d16a44fd5c0ef06