xxg.isd.mybluehost.me Open in urlscan Pro
162.241.30.51  Malicious Activity! Public Scan

Submitted URL: https://q-r.to/bfP8cf
Effective URL: https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/
Submission: On September 19 via automatic, source phishtank — Scanned from CA

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 162.241.30.51, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is xxg.isd.mybluehost.me.
TLS certificate: Issued by R10 on August 9th 2024. Valid for: 3 months.
This is the only time xxg.isd.mybluehost.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Spotify (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 18.238.49.52 16509 (AMAZON-02)
1 162.241.30.51 46606 (UNIFIEDLA...)
1 2
Apex Domain
Subdomains
Transfer
1 mybluehost.me
xxg.isd.mybluehost.me
263 KB
1 q-r.to
q-r.to — Cisco Umbrella Rank: 746512
370 B
1 2
Domain Requested by
1 xxg.isd.mybluehost.me
1 q-r.to 1 redirects
1 2

This site contains links to these domains. Also see Links.

Domain
accounts.spotify.com
www.spotify.com
Subject Issuer Validity Valid
webmail.xxg.isd.mybluehost.me
R10
2024-08-09 -
2024-11-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/
Frame ID: AA99E1BC501FC95ED077F96E8DD9AB66
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Login - Spotify

Page URL History Show full URLs

  1. https://q-r.to/bfP8cf HTTP 302
    https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • /wp-(?:content|includes)/

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

477 kB
Transfer

592 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://q-r.to/bfP8cf HTTP 302
    https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/
Redirect Chain
  • https://q-r.to/bfP8cf
  • https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/
373 KB
263 KB
Document
General
Full URL
https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.30.51 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5916.bluehost.com
Software
nginx/1.25.5 /
Resource Hash
4affce2cbaf847a5ca93588c90b23e482118bb1314d0fdf11bb67f9ee7592cc7

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Response headers

cache-control
max-age=7200
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Thu, 19 Sep 2024 23:18:59 GMT
expires
Fri, 20 Sep 2024 00:04:30 GMT
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
server
nginx/1.25.5
vary
Accept-Encoding
x-endurance-cache-level
2
x-newfold-cache-level
2
x-nginx-cache
WordPress
x-proxy-cache
HIT
x-server-cache
true

Redirect headers

cache-control
no-store, no-cache, must-revalidate
content-type
text/html; charset=UTF-8
date
Thu, 19 Sep 2024 23:18:58 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
https://xxg.isd.mybluehost.me/wp-includes/fonts/Spotify/Issued/settings/
pragma
no-cache
server
nginx
via
1.1 9b2aa79b9573beef202ad020dc96008a.cloudfront.net (CloudFront)
x-amz-cf-id
C2_WKjsz7TR1hwEfsHrMir3Q4yv2H1L2_SUD58RVS8VE4Db2hitwIw==
x-amz-cf-pop
JFK52-P3
x-cache
Miss from cloudfront
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f771fe217119432dbcdb59fe3d3ac37547eadd1a118d1646011d1d7ba7e053bf

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
353 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
372cd0fe98167ffc57b624aed00ab6f53e89bd8cf5690867c1a786983ceec95b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
74 KB
74 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fdf0e3938479eb6e108e7869436051b7072b9a18ecb98b3c6b49d1b29d8bc758

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://xxg.isd.mybluehost.me
Referer

Response headers

Content-Type
application/font-woff
truncated
/
68 KB
68 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6384070e855e2ec15caefb6334ab2c4b1b9e798ce2e369cc00f0d47a41138e0d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://xxg.isd.mybluehost.me
Referer

Response headers

Content-Type
application/font-woff
truncated
/
72 KB
72 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d77456e48416e475066a580b2050cee4f86a3819556d0ddf90d81250f3af9de2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://xxg.isd.mybluehost.me
Referer

Response headers

Content-Type
application/font-woff

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Spotify (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0

0 Cookies