www.mailfiltersec.xyz
Open in
urlscan Pro
178.159.36.89
Malicious Activity!
Public Scan
Submission: On March 05 via api from CA
Summary
This is the only time www.mailfiltersec.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 178.159.36.89 178.159.36.89 | 48666 (AS-MAROSN...) (AS-MAROSNET Moscow) | |
7 | 1 |
ASN48666 (AS-MAROSNET Moscow, Russia, RU)
www.mailfiltersec.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
mailfiltersec.xyz
www.mailfiltersec.xyz |
464 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
7 | www.mailfiltersec.xyz |
www.mailfiltersec.xyz
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://www.mailfiltersec.xyz/almost/wt/
Frame ID: 8D4A64C88BE0F903D645A05C920C509E
Requests: 6 HTTP requests in this frame
Frame:
http://www.mailfiltersec.xyz/almost/wt/bg.png
Frame ID: 517CD1AD7DB5ACF2348C439952046BD9
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.mailfiltersec.xyz/almost/wt/ |
9 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
analytics.js.html
www.mailfiltersec.xyz/almost/wt/WeTransfer_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bWqOLA69nu2fsMi45LjA.js.html
www.mailfiltersec.xyz/almost/wt/WeTransfer_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gtm.js.html
www.mailfiltersec.xyz/almost/wt/WeTransfer_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
webrtc-patch.js
www.mailfiltersec.xyz/almost/wt/chrome-extension_/fdcgdnkidjaadafnichfpabhfomcebme/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
application-bd95c1c273b3b6f2c6b24f2eaeeaef30be54981e5727d3ac981a5e003b93d6a6.css
www.mailfiltersec.xyz/almost/wt/WeTransfer_files/ |
391 KB 391 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
www.mailfiltersec.xyz/almost/wt/ Frame 517C |
63 KB 63 KB |
Document
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| init0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.mailfiltersec.xyz
178.159.36.89
04ea5ae178d46aa6f043ba69308eaace009a9896e8d173e1c6015152495a4524
0af2fd6548db2f2f7ce85324b228f9a1c4b8413b755ba7e898aa8926c6f25660
7650cccb518dc3993c51d7a477c1676cf331e22856d2a5456178e5dc96f0ac39