app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link Open in urlscan Pro
172.105.116.231  Malicious Activity! Public Scan

URL: http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Submission: On December 21 via automatic, source openphish — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 172.105.116.231, located in Singapore and belongs to LINODE-AP Linode, LLC, US. The main domain is app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link.
This is the only time app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
3 172.105.116.231 63949 (LINODE-AP...)
2 2a04:4e42::485 54113 (FASTLY)
5 3
Apex Domain
Subdomains
Transfer
3 temp-site.link
app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
158 KB
2 jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 381
50 KB
5 2
Domain Requested by
3 app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
2 cdn.jsdelivr.net app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
5 2

This site contains no links.

Subject Issuer Validity Valid
jsdelivr.net
GlobalSign Atlas R3 DV TLS CA 2022 Q1
2022-03-21 -
2023-04-22
a year crt.sh

This page contains 1 frames:

Primary Page: http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Frame ID: 3563E3ECAE0EA8DFDB3FA548AD89A32F
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Facebook

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
  • //cdn\.jsdelivr\.net/

Page Statistics

5
Requests

40 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

208 kB
Transfer

426 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request loginfail.php
app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/
3 KB
2 KB
Document
General
Full URL
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Protocol
HTTP/1.1
Server
172.105.116.231 , Singapore, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
172-105-116-231.ip.linodeusercontent.com
Software
nginx-rc /
Resource Hash
aae195f8387dfeed19da585523810d5b71def2873243427c33913351ab301618
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Wed, 21 Dec 2022 01:23:16 GMT
Server
nginx-rc
Transfer-Encoding
chunked
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-Frame-Options
SAMEORIGIN
X-XSS-Protection
1; mode=block
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.2.0-beta1/dist/css/
189 KB
27 KB
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/npm/bootstrap@5.2.0-beta1/dist/css/bootstrap.min.css
Requested by
Host: app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
URL: http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::485 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
fb1763b59f9f5764294b5af9fa5250835ae608282fe6f2f2213a5952aacf1fbf
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
date
Wed, 21 Dec 2022 01:23:16 GMT
x-content-type-options
nosniff
content-encoding
gzip
age
3700653
x-jsd-version
5.2.0-beta1
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length
27328
x-served-by
cache-fra-eddf8230077-FRA, cache-hhn-etou8220099-HHN
x-jsd-version-type
version
etag
W/"2f3f9-YnOsGiPXmhIvAi9qh8W3XCz6/Do"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
martambuah.png
app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/img/
109 KB
110 KB
Image
General
Full URL
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/img/martambuah.png
Requested by
Host: app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
URL: http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Protocol
HTTP/1.1
Server
172.105.116.231 , Singapore, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
172-105-116-231.ip.linodeusercontent.com
Software
nginx-rc /
Resource Hash
d577198130d641e753e3d89a453ffcc7650e4f40b62cd0063ab152f8e55443b0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

Date
Wed, 21 Dec 2022 01:23:16 GMT
X-Content-Type-Options
nosniff
Last-Modified
Tue, 20 Dec 2022 04:35:50 GMT
Server
nginx-rc
ETag
"63a13ba6-1b52c"
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
max-age=2592000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
111916
X-XSS-Protection
1; mode=block
Expires
Fri, 20 Jan 2023 01:23:16 GMT
gassee3-removebg-preview.png
app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/img/
46 KB
46 KB
Image
General
Full URL
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/img/gassee3-removebg-preview.png
Requested by
Host: app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
URL: http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Protocol
HTTP/1.1
Server
172.105.116.231 , Singapore, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
172-105-116-231.ip.linodeusercontent.com
Software
nginx-rc /
Resource Hash
7bac62254633d017df23d084d298b8ac4a9f8b5d33ed849787b8d00d3e6d8ea0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

Date
Wed, 21 Dec 2022 01:23:16 GMT
X-Content-Type-Options
nosniff
Last-Modified
Tue, 20 Dec 2022 04:35:49 GMT
Server
nginx-rc
ETag
"63a13ba5-b824"
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
max-age=2592000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
47140
X-XSS-Protection
1; mode=block
Expires
Fri, 20 Jan 2023 01:23:16 GMT
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.2.0-beta1/dist/js/
78 KB
23 KB
Script
General
Full URL
https://cdn.jsdelivr.net/npm/bootstrap@5.2.0-beta1/dist/js/bootstrap.bundle.min.js
Requested by
Host: app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link
URL: http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/loginfail.php?token=Unndajj88123nNAshda4r774b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::485 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
2515e37eee31f5ef3d659b21dcc84dc6ea732b06872da51078b5b526de34c0c1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://app-gaylord.2opzcasmwf-zqy3jdq2q3kg.p.temp-site.link/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
date
Wed, 21 Dec 2022 01:23:16 GMT
x-content-type-options
nosniff
content-encoding
gzip
age
4826737
x-jsd-version
5.2.0-beta1
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length
23010
x-served-by
cache-fra-eddf8230090-FRA, cache-hhn-etou8220099-HHN
x-jsd-version-type
version
etag
W/"1377e-a0uYWpCr16scLjX/O4dNB8+EEO4"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
truncated
/
264 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ece2e95e0833a3ca202d786151532f388ff73be29ea66334534ed1fa597dfd7d

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontentvisibilityautostatechange function| mousedwn number| uidEvent object| bootstrap

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block