mail.grubdewasaupdate.duckdns.org Open in urlscan Pro
78.128.60.238  Malicious Activity! Public Scan

URL: http://mail.grubdewasaupdate.duckdns.org/
Submission: On October 20 via automatic, source openphish — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 5 HTTP transactions. The main IP is 78.128.60.238, located in Bulgaria and belongs to TELEPOINT, BG. The main domain is mail.grubdewasaupdate.duckdns.org.
This is the only time mail.grubdewasaupdate.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
4 78.128.60.238 31083 (TELEPOINT)
1 2 31.13.92.52 32934 (FACEBOOK)
5 2
Domain Requested by
4 mail.grubdewasaupdate.duckdns.org mail.grubdewasaupdate.duckdns.org
1 www.whatsapp.com mail.grubdewasaupdate.duckdns.org
1 www-cdn.whatsapp.net 1 redirects
5 3
Subject Issuer Validity Valid
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2021-08-28 -
2021-11-26
3 months crt.sh

This page contains 1 frames:

Primary Page: http://mail.grubdewasaupdate.duckdns.org/
Frame ID: 90C7CB03041F40307996F892B626CFD9
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

WhatsApp Group Invite

Page Statistics

5
Requests

20 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

365 kB
Transfer

364 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
mail.grubdewasaupdate.duckdns.org/
7 KB
8 KB
Document
General
Full URL
http://mail.grubdewasaupdate.duckdns.org/
Protocol
HTTP/1.1
Server
78.128.60.238 , Bulgaria, ASN31083 (TELEPOINT, BG),
Reverse DNS
cv1.customizedhosting.net
Software
Apache /
Resource Hash
4492ccab47f303b9013011eade717c976c6d6527df75ed6fa66492a01e6af3bd

Request headers

Host
mail.grubdewasaupdate.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Wed, 20 Oct 2021 02:07:21 GMT
Server
Apache
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Content-Length
7522
Keep-Alive
timeout=5, max=100
Content-Type
text/html; charset=UTF-8
style.build35e635e635e6.css
mail.grubdewasaupdate.duckdns.org/css/v4/
240 KB
241 KB
Stylesheet
General
Full URL
http://mail.grubdewasaupdate.duckdns.org/css/v4/style.build35e635e635e6.css
Requested by
Host: mail.grubdewasaupdate.duckdns.org
URL: http://mail.grubdewasaupdate.duckdns.org/
Protocol
HTTP/1.1
Server
78.128.60.238 , Bulgaria, ASN31083 (TELEPOINT, BG),
Reverse DNS
cv1.customizedhosting.net
Software
Apache /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mail.grubdewasaupdate.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://mail.grubdewasaupdate.duckdns.org/
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://mail.grubdewasaupdate.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Wed, 20 Oct 2021 02:07:21 GMT
Last-Modified
Mon, 15 Apr 2019 14:06:44 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
246233
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: mail.grubdewasaupdate.duckdns.org
URL: http://mail.grubdewasaupdate.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
31.13.92.52 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
whatsapp-cdn-shv-01-frt3.fbcdn.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://mail.grubdewasaupdate.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Redirect headers

location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
date
Wed, 20 Oct 2021 02:07:22 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
alt-svc
h3=":443"; ma=3600,h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
content-type
text/plain
icon-chat.png
mail.grubdewasaupdate.duckdns.org/img/v4/
20 KB
20 KB
Image
General
Full URL
http://mail.grubdewasaupdate.duckdns.org/img/v4/icon-chat.png
Requested by
Host: mail.grubdewasaupdate.duckdns.org
URL: http://mail.grubdewasaupdate.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
HTTP/1.1
Server
78.128.60.238 , Bulgaria, ASN31083 (TELEPOINT, BG),
Reverse DNS
cv1.customizedhosting.net
Software
Apache /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mail.grubdewasaupdate.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://mail.grubdewasaupdate.duckdns.org/css/v4/style.build35e635e635e6.css
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://mail.grubdewasaupdate.duckdns.org/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Wed, 20 Oct 2021 02:07:22 GMT
Last-Modified
Mon, 15 Apr 2019 14:06:46 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
20384
lonte.jpg
mail.grubdewasaupdate.duckdns.org/img/v4/
97 KB
97 KB
Image
General
Full URL
http://mail.grubdewasaupdate.duckdns.org/img/v4/lonte.jpg
Protocol
HTTP/1.1
Server
78.128.60.238 , Bulgaria, ASN31083 (TELEPOINT, BG),
Reverse DNS
cv1.customizedhosting.net
Software
Apache /
Resource Hash
1817b48e3b28895a9fef014a8563cdeeb832217d9e3bbe1a4c68d8844badb0db

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mail.grubdewasaupdate.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://mail.grubdewasaupdate.duckdns.org/
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://mail.grubdewasaupdate.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Wed, 20 Oct 2021 02:07:22 GMT
Last-Modified
Sun, 28 Mar 2021 22:59:00 GMT
Server
Apache
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
image/jpeg
Keep-Alive
timeout=5, max=100
Content-Length
98902

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Message:
Failed to load resource: the server responded with a status of 404 ()