dukanwalay.com
Open in
urlscan Pro
89.23.113.76
Malicious Activity!
Public Scan
Submission: On December 25 via api from RU — Scanned from IL
Summary
TLS certificate: Issued by R11 on December 23rd 2024. Valid for: 3 months.
This is the only time dukanwalay.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 89.23.113.76 89.23.113.76 | 207713 (GIR-AS GL...) (GIR-AS GLOBAL INTERNET SOLUTIONS LLC) | |
9 | 1 |
ASN207713 (GIR-AS GLOBAL INTERNET SOLUTIONS LLC, RU)
PTR: 47446.ip-ptr.tech
dukanwalay.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
dukanwalay.com
dukanwalay.com |
531 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | dukanwalay.com |
dukanwalay.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dukanwalay.com R11 |
2024-12-23 - 2025-03-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dukanwalay.com/?cost=0.048¤cy=usd&external_id=P3tkeH56fHl9f3h9e316e2R-ZHh4cX1xZHh9eX9-fX9kKnF7eHh7fnFkfixwKmQof3x_ZHtwcHxkf38sLHl4fih_LS1x&creative_id=3508485&ad_campaign_id=15&source=responsible-another-traffic-quiet-taste&campaign_name=roi-22039735&publisher_id=flaky-another-traffic
Frame ID: 636C28B190DF4E9AD03B8FE9425104F5
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
dukanwalay.com/ |
355 B 758 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-70e25d6e.js
dukanwalay.com/assets/ |
325 KB 326 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-71dfebed.css
dukanwalay.com/assets/ |
202 KB 202 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
dukanwalay.com/socket.io/ |
118 B 468 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
config
dukanwalay.com/ |
561 B 264 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
dukanwalay.com/ |
150 B 525 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
dukanwalay.com/socket.io/ |
2 B 338 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
dukanwalay.com/socket.io/ |
32 B 381 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
dukanwalay.com/socket.io/ |
1 B 349 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| __VUE__1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dukanwalay.com/ | Name: Auth Value: 8bc76d6e8f66bc35d50923285977e414 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dukanwalay.com
89.23.113.76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