64rgg.b0t22.com Open in urlscan Pro
2606:4700:3031::6815:593b  Malicious Activity! Public Scan

Submitted URL: https://twitterlipw.taqueriamiguelitosdenton.com/zwtlyxjuzxlaa2vhcm5lewnvlmnvbq==
Effective URL: https://64rgg.b0t22.com/cdn-cgi/phish-bypass?atok=8B1JghSy0hkgsOtS9MGipUzfdMBcDA7XrZzysWDOykM-1702255355-0-%2Feli55e
Submission: On December 11 via api from US — Scanned from US

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 5 HTTP transactions. The main IP is 2606:4700:3031::6815:593b, located in United States and belongs to CLOUDFLARENET, US. The main domain is 64rgg.b0t22.com.
TLS certificate: Issued by E1 on November 30th 2023. Valid for: 3 months.
This is the only time 64rgg.b0t22.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Cloudflare (Online)

Domain & IP information

IP Address AS Autonomous System
1 108.167.183.97 19871 (NETWORK-S...)
4 2606:4700:303... 13335 (CLOUDFLAR...)
5 2
Domain Requested by
4 64rgg.b0t22.com twitterlipw.taqueriamiguelitosdenton.com
64rgg.b0t22.com
1 twitterlipw.taqueriamiguelitosdenton.com
5 2

This site contains no links.

Subject Issuer Validity Valid
taqueriamiguelitosdenton.com
R3
2023-11-21 -
2024-02-19
3 months crt.sh
b0t22.com
E1
2023-11-30 -
2024-02-28
3 months crt.sh

This page contains 1 frames:

Primary Page: https://64rgg.b0t22.com/cdn-cgi/phish-bypass?atok=8B1JghSy0hkgsOtS9MGipUzfdMBcDA7XrZzysWDOykM-1702255355-0-%2Feli55e
Frame ID: B825A67B93ABA4487ED0B52E56B033C6
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

403 Forbidden

Page URL History Show full URLs

  1. https://twitterlipw.taqueriamiguelitosdenton.com/zwtlyxjuzxlaa2vhcm5lewnvlmnvbq== Page URL
  2. https://64rgg.b0t22.com/eli55e Page URL
  3. https://64rgg.b0t22.com/cdn-cgi/phish-bypass?atok=8B1JghSy0hkgsOtS9MGipUzfdMBcDA7XrZzysWDOykM-170225... Page URL

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

8 kB
Transfer

29 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://twitterlipw.taqueriamiguelitosdenton.com/zwtlyxjuzxlaa2vhcm5lewnvlmnvbq== Page URL
  2. https://64rgg.b0t22.com/eli55e Page URL
  3. https://64rgg.b0t22.com/cdn-cgi/phish-bypass?atok=8B1JghSy0hkgsOtS9MGipUzfdMBcDA7XrZzysWDOykM-1702255355-0-%2Feli55e Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
zwtlyxjuzxlaa2vhcm5lewnvlmnvbq==
twitterlipw.taqueriamiguelitosdenton.com/
129 B
332 B
Document
General
Full URL
https://twitterlipw.taqueriamiguelitosdenton.com/zwtlyxjuzxlaa2vhcm5lewnvlmnvbq==
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
108.167.183.97 , United States, ASN19871 (NETWORK-SOLUTIONS-HOSTING, US),
Reverse DNS
bacisac.pe
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-length
131
content-type
text/html; charset=UTF-8
date
Mon, 11 Dec 2023 00:42:34 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
server
Apache
vary
Accept-Encoding
eli55e
64rgg.b0t22.com/
5 KB
2 KB
Document
General
Full URL
https://64rgg.b0t22.com/eli55e
Requested by
Host: twitterlipw.taqueriamiguelitosdenton.com
URL: https://twitterlipw.taqueriamiguelitosdenton.com/zwtlyxjuzxlaa2vhcm5lewnvlmnvbq==
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::6815:593b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
91640a6b0ceeee22b427c689640dda17392b33f7909775db00a832dbd3a84878
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://twitterlipw.taqueriamiguelitosdenton.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-ray
8339b0463c679acb-MIA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Mon, 11 Dec 2023 00:42:35 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=jAn%2Bjk57MwaAZkkqN0UPiXAz9ndMaF5t9EHo7Q%2ByeVZ3%2BLEFDXRMZEZJuRWJ7WoUb9l4tgPLJhnMQDO%2F3PddRRSmCdDKRh7XTI5MQ7M2B0v8xADuE46OHPHqyQ3uNf6sYpdL9D2RxyBxR8dWPSs%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
cf.errors.css
64rgg.b0t22.com/cdn-cgi/styles/
24 KB
5 KB
Stylesheet
General
Full URL
https://64rgg.b0t22.com/cdn-cgi/styles/cf.errors.css
Requested by
Host: 64rgg.b0t22.com
URL: https://64rgg.b0t22.com/eli55e
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::6815:593b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
en-US,en;q=0.9
Referer
https://64rgg.b0t22.com/eli55e
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36

Response headers

date
Mon, 11 Dec 2023 00:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 01 Dec 2023 15:04:24 GMT
server
cloudflare
etag
W/"6569f5f8-5e44"
x-frame-options
DENY
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=7200, public
cf-ray
8339b0475e2a9acb-MIA
expires
Mon, 11 Dec 2023 02:42:36 GMT
icon-exclamation.png
64rgg.b0t22.com/cdn-cgi/images/
452 B
541 B
Image
General
Full URL
https://64rgg.b0t22.com/cdn-cgi/images/icon-exclamation.png?1376755637
Requested by
Host: 64rgg.b0t22.com
URL: https://64rgg.b0t22.com/cdn-cgi/styles/cf.errors.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::6815:593b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
en-US,en;q=0.9
Referer
https://64rgg.b0t22.com/cdn-cgi/styles/cf.errors.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36

Response headers

date
Mon, 11 Dec 2023 00:42:36 GMT
x-content-type-options
nosniff
last-modified
Fri, 01 Dec 2023 15:04:24 GMT
server
cloudflare
etag
"6569f5f8-1c4"
x-frame-options
DENY
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=7200, public
accept-ranges
bytes
cf-ray
8339b047aeac9acb-MIA
content-length
452
expires
Mon, 11 Dec 2023 02:42:36 GMT
Primary Request phish-bypass
64rgg.b0t22.com/cdn-cgi/
553 B
293 B
Document
General
Full URL
https://64rgg.b0t22.com/cdn-cgi/phish-bypass?atok=8B1JghSy0hkgsOtS9MGipUzfdMBcDA7XrZzysWDOykM-1702255355-0-%2Feli55e
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3031::6815:593b , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
982b986bb578e137f062099427a8caec3c501c84a9e4b22369ebd2badec42fe7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://64rgg.b0t22.com/eli55e
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

cf-ray
8339b068ca8e3341-MIA
content-encoding
gzip
content-type
text/html
date
Mon, 11 Dec 2023 00:42:41 GMT
server
cloudflare
x-content-type-options
nosniff
x-frame-options
DENY

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Cloudflare (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

1 Cookies

Domain/Path Name / Value
twitterlipw.taqueriamiguelitosdenton.com/ Name: PHPSESSID
Value: a0fb5c70eb71fc5d106a662fa5ceaa94

1 Console Messages

Source Level URL
Text
network error URL: https://64rgg.b0t22.com/cdn-cgi/phish-bypass?atok=8B1JghSy0hkgsOtS9MGipUzfdMBcDA7XrZzysWDOykM-1702255355-0-%2Feli55e
Message:
Failed to load resource: the server responded with a status of 403 ()