fxp7435a3.duckdns.org
Open in
urlscan Pro
5.75.252.135
Malicious Activity!
Public Scan
Effective URL: https://fxp7435a3.duckdns.org/
Submission: On June 06 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on June 6th 2023. Valid for: 3 months.
This is the only time fxp7435a3.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AEON Group (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 103.80.134.90 103.80.134.90 | 3786 (LGDACOM L...) (LGDACOM LG DACOM Corporation) | |
1 8 | 5.75.252.135 5.75.252.135 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 | 2606:4700:10:... 2606:4700:10::ac43:d8c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 149.56.240.129 149.56.240.129 | 16276 (OVH) (OVH) | |
10 | 5 |
ASN3786 (LGDACOM LG DACOM Corporation, KR)
iu9xx3.duckdns.org |
ASN24940 (HETZNER-AS, DE)
PTR: static.135.252.75.5.clients.your-server.de
fxp7435a3.duckdns.org |
ASN16276 (OVH, FR)
PTR: ns534297.ip-149-56-240.net
s4.histats.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
duckdns.org
1 redirects
iu9xx3.duckdns.org fxp7435a3.duckdns.org |
511 KB |
2 |
histats.com
s10.histats.com — Cisco Umbrella Rank: 12982 s4.histats.com — Cisco Umbrella Rank: 12815 |
5 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
8 | fxp7435a3.duckdns.org |
1 redirects
iu9xx3.duckdns.org
fxp7435a3.duckdns.org |
1 | s4.histats.com |
s10.histats.com
|
1 | s10.histats.com |
fxp7435a3.duckdns.org
|
1 | iu9xx3.duckdns.org | |
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cbuilcmw.duckdns.org R3 |
2023-06-06 - 2023-09-04 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-13 - 2024-05-11 |
a year | crt.sh |
histats.com R3 |
2023-03-15 - 2023-06-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fxp7435a3.duckdns.org/
Frame ID: 5127885E644C9C884932645FCE65645B
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://iu9xx3.duckdns.org/ Page URL
-
http://fxp7435a3.duckdns.org/
HTTP 301
https://fxp7435a3.duckdns.org/ Page URL
Detected technologies
Element UI (JavaScript Frameworks) ExpandDetected patterns
- <(?:div|button) class="el-(?:table-column|table-filter|popper|pagination|pager|select-group|form|form-item|color-predefine|color-hue-slider|color-svpanel|color-alpha-slider|color-dropdown|color-picker|badge|tree|tree-node|select|message|dialog|checkbox|checkbox-button|checkbox-group|container|steps|carousel|menu|menu-item|submenu|menu-item-group|button|button-group|card|table|select-dropdown|row|tabs|notification|radio|progress|progress-bar|tag|popover|tooltip|cascader|cascader-menus|cascader-menu|time-spinner|spinner|spinner-inner|transfer|transfer-panel|rate|slider|dropdown|dropdown-menu|textarea|input|input-group|popup-parent|radio-group|main|breadcrumb|time-range-picker|date-range-picker|year-table|date-editor|range-editor|time-spinner|date-picker|time-panel|date-table|month-table|picker-panel|collapse|collapse-item|alert|select-dropdown|select-dropdown__empty|select-dropdown__wrap|select-dropdown__list|scrollbar|switch|carousel|upload|upload-dragger|upload-list|upload-cover|aside|input-number|header|message-box|footer|radio-button|step|autocomplete|autocomplete-suggestion|loading-parent|loading-mask|loading-spinner|)
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://iu9xx3.duckdns.org/ Page URL
-
http://fxp7435a3.duckdns.org/
HTTP 301
https://fxp7435a3.duckdns.org/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
iu9xx3.duckdns.org/ |
392 B 623 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
fxp7435a3.duckdns.org/ Redirect Chain
|
1 KB 765 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-564de1da.js
fxp7435a3.duckdns.org/assets/ |
904 KB 332 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-3d2f9115.css
fxp7435a3.duckdns.org/assets/ |
572 KB 104 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js15_as.js
s10.histats.com/ |
11 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.php
s4.histats.com/stats/ |
51 B 185 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp_header_logo-570d472f.png
fxp7435a3.duckdns.org/assets/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KBC11SN000B_button_01-61eba57c.png
fxp7435a3.duckdns.org/assets/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp_footer_question-93873e2c.png
fxp7435a3.duckdns.org/assets/ |
23 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp_pageup-5206b69d.png
fxp7435a3.duckdns.org/assets/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AEON Group (Financial)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend object| _Hasync function| chfh function| chfh2 string| _HST_cntval object| Histats object| _HistatsCounterGraphics_0_setValues object| __vueuse_ssr_handlers__ boolean| __VUE__9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
fxp7435a3.duckdns.org/ | Name: HstCfa4772258 Value: 1686046254196 |
|
fxp7435a3.duckdns.org/ | Name: HstCla4772258 Value: 1686046254196 |
|
fxp7435a3.duckdns.org/ | Name: HstCmu4772258 Value: 1686046254196 |
|
fxp7435a3.duckdns.org/ | Name: HstPn4772258 Value: 1 |
|
fxp7435a3.duckdns.org/ | Name: HstPt4772258 Value: 1 |
|
fxp7435a3.duckdns.org/ | Name: HstCnv4772258 Value: 1 |
|
fxp7435a3.duckdns.org/ | Name: HstCns4772258 Value: 1 |
|
fxp7435a3.duckdns.org/ | Name: c_ref_4772258 Value: http%3A%2F%2Fiu9xx3.duckdns.org%2F |
|
fxp7435a3.duckdns.org/ | Name: sessionid Value: e4e17514e6e07ce3f6c3c00daac2590f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fxp7435a3.duckdns.org
iu9xx3.duckdns.org
s10.histats.com
s4.histats.com
103.80.134.90
149.56.240.129
2606:4700:10::ac43:d8c
5.75.252.135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