applvveb3.top
Open in
urlscan Pro
2606:4700:3030::ac43:d738
Malicious Activity!
Public Scan
Effective URL: https://applvveb3.top/download.html
Submission: On September 13 via api from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on September 11th 2023. Valid for: 3 months.
This is the only time applvveb3.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 193.106.174.149 193.106.174.149 | 50465 (IQHOST) (IQHOST) | |
1 | 2606:4700:303... 2606:4700:3031::ac43:870a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700:303... 2606:4700:3030::ac43:d738 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
10 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
egzodouse.top
egzodouse.top |
84 KB |
3 |
applvveb3.top
applvveb3.top |
789 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 419 |
31 KB |
1 |
1stvvallet.top
1stvvallet.top |
894 B |
10 | 4 |
Domain | Requested by | |
---|---|---|
5 | egzodouse.top |
egzodouse.top
|
3 | applvveb3.top |
1stvvallet.top
applvveb3.top |
1 | ajax.googleapis.com |
applvveb3.top
|
1 | 1stvvallet.top |
egzodouse.top
|
10 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
discord.gg |
Subject Issuer | Validity | Valid | |
---|---|---|---|
egzodouse.top R3 |
2023-09-08 - 2023-12-07 |
3 months | crt.sh |
1stvvallet.top E1 |
2023-09-07 - 2023-12-06 |
3 months | crt.sh |
applvveb3.top GTS CA 1P5 |
2023-09-11 - 2023-12-10 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-08-14 - 2023-11-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://applvveb3.top/download.html
Frame ID: CDC80638102348BCF71AE2AE2A9B97F3
Requests: 28 HTTP requests in this frame
Screenshot
Page Title
Crypto Wallet App Download for Desktop & Mobile | Exodus DownloadFacebookTwitterYouTubeDownload Windows AppDownload For MacDownload Linux AppDownload on the App StoreDownload on Google PlayDiscordGithubYouTubeRedditTwitterSlackFacebookPage URL History Show full URLs
- https://egzodouse.top/ Page URL
- https://applvveb3.top/download.html Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Discord
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://egzodouse.top/ Page URL
- https://applvveb3.top/download.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
egzodouse.top/ |
18 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
egzodouse.top/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
egzodouse.top/css/font-awesome-4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner-468-60.jpg
egzodouse.top/img/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slider1.jpg
egzodouse.top/img/ |
38 KB 38 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KvJFsGN1
1stvvallet.top/ |
398 B 894 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
download.html
applvveb3.top/ |
1 MB 777 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
32 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
135 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
154 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
465 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
163 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
98 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
applvveb3.top/js/ |
45 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base.js
applvveb3.top/js/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
64 KB 64 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)87 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture function| $ function| jQuery string| lang function| chooselang function| validateWord function| submitSeed object| allowedWords function| openselect function| closeselect function| openmodal1 function| choosenetwork function| openpopup1 function| openpopup2 function| openpopup3 function| closemodal1 function| showother function| _x function| vib function| clickbtnww object| els__inputs number| int__maxSimbols function| clickbtn function| clickbtn2 function| opensetting function| closesetting function| openbuycrypto function| closebuycrypto function| openModalError_button function| func24 function| func12 function| funckey function| closemodal function| closemodalfirst undefined| hash function| openmulti function| openfarms function| openpool function| openiao function| opennft function| openauction function| openganna function| openbsc function| openavax function| openpolygon function| openfantom function| openharmony function| openhome function| hecooption function| ethoption function| bscoption function| openvalid function| closevalid function| lendover function| lendout function| homeover function| homeout function| farmover function| farmout function| stakeover function| stakeout function| loansover function| loansout function| changebsc function| changeheco function| changeklaytn function| choosepayklaytn function| choosepaybsc function| choosepayheco function| chooseex function| closechooseex function| openmodal function| openmynodes function| openallnodes function| openmining function| open12 function| open15 function| open18 function| open21 function| open24 function| showmore function| closeall function| bigImg function| normalImg boolean| jj boolean| jj20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1stvvallet.top
ajax.googleapis.com
applvveb3.top
egzodouse.top
193.106.174.149
2606:4700:3030::ac43:d738
2606:4700:3031::ac43:870a
2a00:1450:4001:810::200a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