phase1-wormhole.com
Open in
urlscan Pro
2606:4700:3032::6815:2405
Malicious Activity!
Public Scan
Submission Tags: https://sinking.yachts sinking-yachts phishing Search All
Submission: On April 08 via api from CZ — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on April 3rd 2024. Valid for: 3 months.
This is the only time phase1-wormhole.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3032::6815:2405 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 172.67.182.171 172.67.182.171 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.2.184 104.17.2.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.3.184 104.17.3.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
phase1-wormhole.com
phase1-wormhole.com |
128 KB |
2 |
cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 4630 |
14 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
5 | phase1-wormhole.com |
phase1-wormhole.com
|
2 | challenges.cloudflare.com |
phase1-wormhole.com
challenges.cloudflare.com |
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
phase1-wormhole.com GTS CA 1P5 |
2024-04-03 - 2024-07-02 |
3 months | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://phase1-wormhole.com/
Frame ID: 199C0F5B0103EA4AEECC7DE8314E6096
Requests: 8 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2lh7s/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
Frame ID: 60AAE0DD19569DD174A718147EE696A4
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
phase1-wormhole.com/ |
16 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v1
phase1-wormhole.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/ |
385 KB 105 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
challenges.cloudflare.com/turnstile/v0/b/bcc5fb0a8815/ |
40 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
phase1-wormhole.com/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
77f37653-41ef-4aaa-a0d0-2d7d6e6d1b8c
https://phase1-wormhole.com/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
d36041a0a8e05c1
phase1-wormhole.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1931025673:1712598857:2JbtSuxdtf-crJKIqevH2OyjbB65LDL3OiKJueoOX3w/871435c75cec3a8e/ |
16 KB 12 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
normal
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2lh7s/0x4AAAAAAADnPIDROrmt1Wwj/light/ Frame 60AA |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
38b61db1-ab32-451d-ba97-d6f37274b0ef
https://phase1-wormhole.com/ |
80 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
phase1-wormhole.com/ |
1 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
task.url
Submitted on
April 8th 2024, 6:09:51 pm
UTC —
From Czech Republic
Threats:
Phishing
Scam
Comment: This domain is present in the Sinking Yachts anti-phishing list. More Info: https://sinking.yachts
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| _cf_chl_opt function| HrjuF1 boolean| KaiqDo8 function| wYHO8 function| XxXBN3 function| rTya5 object| FvgJ7 object| CzJOu7 function| wXagv3 function| PsSt8 function| rQHZa5 object| gKrrTp6 number| Dekg1 object| angular object| turnstile boolean| epUoWW3 string| tvUPr70 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
phase1-wormhole.com
104.17.2.184
104.17.3.184
172.67.182.171
2606:4700:3032::6815:2405
0df937ac29ecf2e2850863a40c6542a2c69736e8d4733a34dd065b02905f4801
1d5d7571ddb9876d6bdb02c3291e62d788f660b71e6eb9d9032234a691db4680
4c13d452dd5d49671bd93ca32f2b4f85c78e39b6ab0ad1f38d98ed267f8fd896
8860e7fef89219a219cb11d18bd8e4a322f32072613f86e935e7fe162ab69c04
8f1ad19042c2f9ee60c2de21f37f788af7b1ecccda8eec1d877f9b9c0e994370
aecd2e72811bdda7070ad8a0e77311b560f683606066424eaa57310640ffd6ee
d0db4a4f41665eac2bbf2d63191bf084ea250b4758550e60487a42084ca89273