vitrilo.shop
Open in
urlscan Pro
77.221.159.83
Malicious Activity!
Public Scan
Effective URL: https://vitrilo.shop/
Submission: On October 11 via api from CZ — Scanned from FI
Summary
TLS certificate: Issued by R10 on September 21st 2024. Valid for: 3 months.
This is the only time vitrilo.shop was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 77.221.159.83 77.221.159.83 | 210644 (AEZA-AS) (AEZA-AS) | |
15 | 1 |
ASN210644 (AEZA-AS, GB)
PTR: adaptable-liquid.aeza.network
vitrilo.shop |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
vitrilo.shop
vitrilo.shop |
392 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | vitrilo.shop |
vitrilo.shop
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
telegram.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
vitrilo.shop R10 |
2024-09-21 - 2024-12-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://vitrilo.shop/
Frame ID: 630C9A163F0DBF45A62E7DBAC9C68673
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
😎 CAMINO AL EXITO 😎Page URL History Show full URLs
-
http://vitrilo.shop/
HTTP 307
https://vitrilo.shop/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://vitrilo.shop/
HTTP 307
https://vitrilo.shop/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
vitrilo.shop/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-roboto.css
vitrilo.shop/assets/ |
6 KB 911 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
vitrilo.shop/assets/ |
42 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegram.css
vitrilo.shop/assets/ |
112 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
avatar.png
vitrilo.shop/ |
203 KB 204 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
vitrilo.shop/assets/ |
85 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tgwallpaper.min.js
vitrilo.shop/assets/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wallpaper.js
vitrilo.shop/assets/ |
647 B 628 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
vitrilo.shop/assets/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pattern.svg
vitrilo.shop/assets/ |
226 KB 81 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
vitrilo.shop/assets/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
vitrilo.shop/assets/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
click
vitrilo.shop/ajax/ |
16 B 248 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
link
vitrilo.shop/ajax/ |
67 B 284 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
vitrilo.shop/assets/ |
15 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| TWallpaper function| toggleTheme1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vitrilo.shop/ajax | Name: clicked Value: 1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
vitrilo.shop
77.221.159.83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