cservicetowallet.dns.army
Open in
urlscan Pro
31.192.233.156
Malicious Activity!
Public Scan
Submission: On November 29 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on November 29th 2023. Valid for: 3 months.
This is the only time cservicetowallet.dns.army was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online) Metamask (Crypto)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 31.192.233.156 31.192.233.156 | 44493 (CHELYABIN...) (CHELYABINSK-SIGNAL-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:831::200a | 15169 (GOOGLE) (GOOGLE) | |
4 | 2a00:1450:400... 2a00:1450:4001:813::2003 | 15169 (GOOGLE) (GOOGLE) | |
18 | 3 |
ASN44493 (CHELYABINSK-SIGNAL-AS, RU)
PTR: dammylaston.c
cservicetowallet.dns.army |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
dns.army
cservicetowallet.dns.army |
198 KB |
4 |
gstatic.com
fonts.gstatic.com |
60 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 31 |
1010 B |
18 | 3 |
Domain | Requested by | |
---|---|---|
13 | cservicetowallet.dns.army |
cservicetowallet.dns.army
|
4 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
cservicetowallet.dns.army
|
18 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cservicetowallet.dns.army R3 |
2023-11-29 - 2024-02-27 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-10-23 - 2024-01-15 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-10-23 - 2024-01-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cservicetowallet.dns.army/
Frame ID: 266DFB99B6013B9DC7C6813D5ADFB692
Requests: 18 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
cservicetowallet.dns.army/ |
34 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
cservicetowallet.dns.army/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
cservicetowallet.dns.army/js/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.1.min.js
cservicetowallet.dns.army/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.js
cservicetowallet.dns.army/js/ |
265 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
cservicetowallet.dns.army/js/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon.png
cservicetowallet.dns.army/img/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
cservicetowallet.dns.army/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
confirm.png
cservicetowallet.dns.army/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
full.png
cservicetowallet.dns.army/img/ |
581 B 886 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eye-close.png
cservicetowallet.dns.army/img/ |
880 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tada.png
cservicetowallet.dns.army/img/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
cservicetowallet.dns.army/js/ |
18 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
8 KB 1010 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiEyp8kv8JHgFVrJJfecg.woff2
fonts.gstatic.com/s/poppins/v20/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiByp8kv8JHgFVrLCz7Z1xlFQ.woff2
fonts.gstatic.com/s/poppins/v20/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiEyp8kv8JHgFVrJJnecmNE.woff2
fonts.gstatic.com/s/poppins/v20/ |
5 KB 6 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiEyp8kv8JHgFVrJJbecmNE.woff2
fonts.gstatic.com/s/poppins/v20/ |
39 KB 39 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online) Metamask (Crypto)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery function| Popper0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cservicetowallet.dns.army
fonts.googleapis.com
fonts.gstatic.com
2a00:1450:4001:813::2003
2a00:1450:4001:831::200a
31.192.233.156
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0dfa5859acd573caf7190fa333e1551503cc295ebabe5c7051c90cfbf9d190a9
1f7fa9e9c13e554f4777775b767fd61834dad108d696f6ce518122d629e62af6
210e7b9452ec5d9fbd671bb83b58cfed2014dfcd1a7e0ca1162dde5a2d8bb227
2e318143bce974fb2d091207dc59a888a64eab1c3fb4362d61330b18901a03f0
461ef0864ed3d660c3f24b34676a3704f4609bdf6efc82720c9119c1606cb0a1
478b3ab728aaa25a76c8cd8bb04addde92c43d72e643d0fdc455340b44c3f074
68ba91db08e7f6e67d5aa7c6314427e93475c351f08131961b244d173e92e460
7d93459d86585bfcdbb7e0376056226adb25821ee54b96236fe2123e9560929f
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
88746bdb585f8bf1daa92ce979dbecf942f98c36e9e33af52d5ee0ba43157306
8ef89f39e8d91c95215c408083a0f88791fa85da70d5b68680b9e53a28d4c21e
9338e65fc077355c7a87ae0d64cc101e23b9bf8ad78ae65f0f319c857311b526
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
a7a0d45ca1a304a6090fd4212bf4f19d89e2a287407c6c7f863749536eda57f9
cb8bdeabc838774d9808eb7c4cfcea963b57855e34f84b54797076940c8e5986
d0c0eb88cb9c1bf027069812528daf866aa29bb2d3ac016bc1d4b494b3bb486c
d8aa24ecc6cecb1a60515bc093f1c9da38a0392612d9ab8ae0f7f36e6eee1fad