uua.whastbyy.bond
Open in
urlscan Pro
38.6.160.116
Malicious Activity!
Public Scan
Submission: On November 07 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on November 4th 2023. Valid for: 3 months.
This is the only time uua.whastbyy.bond was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 38.6.160.116 38.6.160.116 | 55020 (IDCCLOUD) (IDCCLOUD) | |
2 | 2606:4700:303... 2606:4700:3034::ac43:ab63 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
whastbyy.bond
uua.whastbyy.bond |
360 KB |
2 |
whatkknew.com
www.whatkknew.com |
8 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
4 | uua.whastbyy.bond |
uua.whastbyy.bond
|
2 | www.whatkknew.com |
uua.whastbyy.bond
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
uua.whastbyy.com R3 |
2023-11-04 - 2024-02-02 |
3 months | crt.sh |
whatkknew.com GTS CA 1P5 |
2023-10-31 - 2024-01-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://uua.whastbyy.bond/
Frame ID: 7DA3D7C646D5AFF613FC4DBE971B44B3
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
uua.whastbyy.bond/ |
749 B 980 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.d25f0563.css
uua.whastbyy.bond/css/ |
235 KB 45 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.ba4f7857.js
uua.whastbyy.bond/js/ |
956 KB 309 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
web.91139193.js
uua.whastbyy.bond/js/ |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
walid
www.whatkknew.com/whatsapp/ |
46 B 534 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qrcode
www.whatkknew.com/whatsapp/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| webpackJsonp function| _0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
uua.whastbyy.bond
www.whatkknew.com
2606:4700:3034::ac43:ab63
38.6.160.116
1bebba22cabbfd8e999e53d35ecb55b8cb82a9e928eed9ed10f9160ba1154e45
277b691506a768b3fad9f597b1b76701ea9cda19024813e1775eb2b09a86d352
359c9b2e88f5cb2c0b4ff3d00d583bd87708316528fb63a7891b7d1c55259b16
ae9fdf03babdb5d050f36a651732a29128377217d38d08a17d7157d056a1960b
b8ec5d902cc9fe345b625fc404ec5fd775b2e16d3101d50239e684be7c9b7c25
c5d78043c59070371b048d1fdfc51aefaffe2d5ec554915cc9e7326a99afb176