gurdalcocukyuvalarim.com
Open in
urlscan Pro
94.138.221.106
Malicious Activity!
Public Scan
Submission: On April 19 via automatic, source phishtank
Summary
This is the only time gurdalcocukyuvalarim.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 94.138.221.106 94.138.221.106 | 49126 (AS49126) (AS49126) | |
2 | 216.58.210.10 216.58.210.10 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 216.58.214.99 216.58.214.99 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
13 | 3 |
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s07-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s05-in-f99.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
gurdalcocukyuvalarim.com
gurdalcocukyuvalarim.com |
233 KB |
2 |
googleapis.com
fonts.googleapis.com |
581 B |
1 |
gstatic.com
fonts.gstatic.com |
18 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
10 | gurdalcocukyuvalarim.com |
gurdalcocukyuvalarim.com
|
2 | fonts.googleapis.com |
gurdalcocukyuvalarim.com
|
1 | fonts.gstatic.com |
gurdalcocukyuvalarim.com
|
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://gurdalcocukyuvalarim.com/mxa/xb/8e624428269b1e296f49085bd6b42d2
Frame ID: D34474E202CC6418C5ADE29E3A6357A4
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
Java (Programming Languages) ExpandDetected patterns
- headers server /mod_jk(?:\/([\d\.]+))?/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_jk (Web Server Extensions) Expand
Detected patterns
- headers server /mod_jk(?:\/([\d\.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_jk(?:\/([\d\.]+))?/i
Apache Tomcat (Web Servers) Expand
Detected patterns
- headers server /mod_jk(?:\/([\d\.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
8e624428269b1e296f49085bd6b42d2
gurdalcocukyuvalarim.com/mxa/xb/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
248 B 302 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
gurdalcocukyuvalarim.com/mxa/xb/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
248 B 279 B |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
landing-devices-bg.jpg
gurdalcocukyuvalarim.com/mxa/xb/images/ |
195 KB 196 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
oneDrive.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
mem5YaGs126MiZpBA-UNirkOUuhs.ttf
fonts.gstatic.com/s/opensans/v15/ |
27 KB 18 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gmail.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
outlook.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aol.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yahooMail.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
office.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.png
gurdalcocukyuvalarim.com/mxa/xb/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| popupwnd0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
gurdalcocukyuvalarim.com
216.58.210.10
216.58.214.99
94.138.221.106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