dirtycustomz.net
Open in
urlscan Pro
77.104.146.156
Malicious Activity!
Public Scan
Submission: On January 27 via automatic, source openphish
Summary
This is the only time dirtycustomz.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer) Generic Email (Online) Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 77.104.146.156 77.104.146.156 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC - SingleHop) | |
3 | 68.65.122.38 68.65.122.38 | 22612 (NAMECHEAP...) (NAMECHEAP-NET - Namecheap) | |
8 | 2 |
ASN32475 (SINGLEHOP-LLC - SingleHop, Inc., US)
PTR: ip-77-104-146-156.siteground.com
dirtycustomz.net |
ASN22612 (NAMECHEAP-NET - Namecheap, Inc., US)
PTR: s163.web-hosting.com
jiukkang.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
dirtycustomz.net
dirtycustomz.net |
16 KB |
3 |
jiukkang.com
jiukkang.com |
109 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
5 | dirtycustomz.net |
dirtycustomz.net
|
3 | jiukkang.com |
dirtycustomz.net
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://dirtycustomz.net/adobie/invoice2.htm
Frame ID: 19105.1
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
invoice2.htm
dirtycustomz.net/adobie/ |
14 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pdf-logo.png
jiukkang.com/dobe/ |
31 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
100Secure.jpg
jiukkang.com/dobe/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
jiukkang.com/dobe/ |
73 KB 73 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
small.png
dirtycustomz.net/adobie/ |
860 B 866 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
et-line.woff
dirtycustomz.net/adobie/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
et-line.ttf
dirtycustomz.net/adobie/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
dirtycustomz.net/ |
1 KB 1 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer) Generic Email (Online) Excel / PDF download (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.dirtycustomz.net/ | Name: frontend Value: q6pnb4df730eb0sk1icg7e43b1 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dirtycustomz.net
jiukkang.com
68.65.122.38
77.104.146.156
2f71bea7601b970d07eea91af38bcee8b1c9fc197b5f85cbe9bae3b9f2b705c5
57ee51a5bc96d3b35fead3096f0586b7580f50865a27e0fb054a14bbc7056b8f
bfb7362b6a5d508578ebe4f1884a92dba530b76fbe6be8db4a7b771c6aacaccf
ce2de4b3be943fd5414dc6f3190d332fc9f6369f5dfbf6366b00b261ed02a4cf
d5a135bd47b11881dc1a223ea1ea946e6ca5e7cb3b1af58eef8629ea017dbd4e
e8920630eaec1e4e551776a474ec5c76eee010d8fc6ed484b7f8f8b85579ea4c