joingruphotttt.duckdns.org Open in urlscan Pro
142.93.32.76  Malicious Activity! Public Scan

URL: https://joingruphotttt.duckdns.org/
Submission: On August 24 via automatic, source openphish

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 5 HTTP transactions. The main IP is 142.93.32.76, located in London, United Kingdom and belongs to DIGITALOCEAN-ASN, US. The main domain is joingruphotttt.duckdns.org.
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 23rd 2021. Valid for: 3 months.
This is the only time joingruphotttt.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
3 142.93.32.76 14061 (DIGITALOC...)
1 145.239.131.51 16276 (OVH)
1 2 2a03:2880:f22... 32934 (FACEBOOK)
5 3
Apex Domain
Subdomains
Transfer
3 duckdns.org
joingruphotttt.duckdns.org
268 KB
1 whatsapp.com
www.whatsapp.com
1 whatsapp.net
www-cdn.whatsapp.net
167 B
1 ibb.co
i.ibb.co
12 KB
5 4
Domain Requested by
3 joingruphotttt.duckdns.org joingruphotttt.duckdns.org
1 www.whatsapp.com joingruphotttt.duckdns.org
1 www-cdn.whatsapp.net 1 redirects
1 i.ibb.co joingruphotttt.duckdns.org
5 4
Subject Issuer Validity Valid
joingruphotttt.duckdns.org
cPanel, Inc. Certification Authority
2021-08-23 -
2021-11-21
3 months crt.sh
ibb.co
R3
2021-08-06 -
2021-11-04
3 months crt.sh
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2021-07-11 -
2021-10-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://joingruphotttt.duckdns.org/
Frame ID: 43AE470AFC68E761DA591DAFF3C8D52A
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

WhatsApp Group Invite

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

100 %
HTTPS

33 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

280 kB
Transfer

279 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
joingruphotttt.duckdns.org/
7 KB
7 KB
Document
General
Full URL
https://joingruphotttt.duckdns.org/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
142.93.32.76 London, United Kingdom, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
f6537ff1b5e4d1bef16c2d0d9510615063eb93ff22e03d5dc0306e40f072e4a6

Request headers

Host
joingruphotttt.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 24 Aug 2021 01:31:40 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.build35e635e635e6.css
joingruphotttt.duckdns.org/css/v4/
240 KB
241 KB
Stylesheet
General
Full URL
https://joingruphotttt.duckdns.org/css/v4/style.build35e635e635e6.css
Requested by
Host: joingruphotttt.duckdns.org
URL: https://joingruphotttt.duckdns.org/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
142.93.32.76 London, United Kingdom, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
joingruphotttt.duckdns.org
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://joingruphotttt.duckdns.org/
Connection
keep-alive
Referer
https://joingruphotttt.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 24 Aug 2021 01:31:40 GMT
Last-Modified
Fri, 02 Jul 2021 20:30:30 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
246233
IMG-20210702-185444.jpg
i.ibb.co/zGQCbDX/
12 KB
12 KB
Image
General
Full URL
https://i.ibb.co/zGQCbDX/IMG-20210702-185444.jpg
Requested by
Host: joingruphotttt.duckdns.org
URL: https://joingruphotttt.duckdns.org/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
nginx /
Resource Hash
1aba5e0d7b5b85c7f11bd947b8b4e06c6a982c0380125bc4bdbd763f867cf818

Request headers

Referer
https://joingruphotttt.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Tue, 24 Aug 2021 01:31:41 GMT
last-modified
Fri, 02 Jul 2021 13:40:49 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
11841
expires
Thu, 31 Dec 2037 23:55:55 GMT
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: joingruphotttt.duckdns.org
URL: https://joingruphotttt.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f22d:c5:face:b00c:0:167 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://joingruphotttt.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Redirect headers

location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
date
Tue, 24 Aug 2021 01:31:41 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
content-type
text/plain
icon-chat.png
joingruphotttt.duckdns.org/img/v4/
20 KB
20 KB
Image
General
Full URL
https://joingruphotttt.duckdns.org/img/v4/icon-chat.png
Requested by
Host: joingruphotttt.duckdns.org
URL: https://joingruphotttt.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
142.93.32.76 London, United Kingdom, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
joingruphotttt.duckdns.org
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://joingruphotttt.duckdns.org/css/v4/style.build35e635e635e6.css
Connection
keep-alive
Referer
https://joingruphotttt.duckdns.org/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 24 Aug 2021 01:31:40 GMT
Last-Modified
Fri, 02 Jul 2021 20:30:30 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
20384

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

0 Cookies