mustylex.com.br
Open in
urlscan Pro
51.79.23.206
Malicious Activity!
Public Scan
Effective URL: https://mustylex.com.br/vendor/.well/
Submission: On July 20 via manual from FR — Scanned from FR
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 24th 2022. Valid for: 3 months.
This is the only time mustylex.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 41.77.118.174 41.77.118.174 | 36666 (GTCOMM) (GTCOMM) | |
1 1 | 45.224.131.247 45.224.131.247 | 266400 (Ferenz Ne...) (Ferenz Networks) | |
3 | 51.79.23.206 51.79.23.206 | 16276 (OVH) (OVH) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2 |
ASN266400 (Ferenz Networks, BR)
PTR: sv-efesios.advendns.org
controle.decosatrastreamento.com.br |
ASN16276 (OVH, FR)
PTR: ip206.ip-51-79-23.hinetworks.com.br
mustylex.com.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
mustylex.com.br
mustylex.com.br |
853 KB |
2 |
chf.ma
2 redirects
chf.ma |
490 B |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2151 |
25 KB |
1 |
decosatrastreamento.com.br
1 redirects
controle.decosatrastreamento.com.br |
230 B |
4 | 4 |
Domain | Requested by | |
---|---|---|
3 | mustylex.com.br |
mustylex.com.br
|
2 | chf.ma | 2 redirects |
1 | stackpath.bootstrapcdn.com |
mustylex.com.br
|
1 | controle.decosatrastreamento.com.br | 1 redirects |
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mustylex.com.br cPanel, Inc. Certification Authority |
2022-06-24 - 2022-09-22 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://mustylex.com.br/vendor/.well/
Frame ID: BC73E5BF01CE779C917381E50D119A03
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://chf.ma/hsd.wtr.lt.dl
HTTP 302
https://chf.ma/hsd.wtr.lt.dl HTTP 301
https://controle.decosatrastreamento.com.br/nmkol HTTP 301
https://mustylex.com.br/vendor/.well/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://chf.ma/hsd.wtr.lt.dl
HTTP 302
https://chf.ma/hsd.wtr.lt.dl HTTP 301
https://controle.decosatrastreamento.com.br/nmkol HTTP 301
https://mustylex.com.br/vendor/.well/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
mustylex.com.br/vendor/.well/ Redirect Chain
|
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wetransfer_logo_we_transfer.png
mustylex.com.br/vendor/.well/assets/img/ |
125 KB 126 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg7.png
mustylex.com.br/vendor/.well/assets/img/ |
721 KB 721 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| sleep function| onLoad1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mustylex.com.br/ | Name: PHPSESSID Value: 444dbda31f334d3df42810e24175239b |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
chf.ma
controle.decosatrastreamento.com.br
mustylex.com.br
stackpath.bootstrapcdn.com
2606:4700::6812:acf
41.77.118.174
45.224.131.247
51.79.23.206
2ff5b959fa9f6b4b1d04d20a37d706e90039176ab1e2a202994d9580baeebfd6
ae4e4a222653828931897ffb694cab25263bb7d9397baa66f9e299f4f454ce92
baac93855451e14898a6b5aaf78da07ffa9b61bb4d75c3a5353b18bb6660eab5
c1e4ca8d14febe2eca37805c3d657d89a52f94af9d8742b21e1afd8ecf556429