pay73-olx.info
Open in
urlscan Pro
91.243.32.48
Malicious Activity!
Public Scan
Submission: On June 10 via api from BR
Summary
TLS certificate: Issued by R3 on June 9th 2021. Valid for: 3 months.
This is the only time pay73-olx.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OLX Group (E-commerce)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 91.243.32.48 91.243.32.48 | 211849 (KAKHAROV-AS) (KAKHAROV-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:82a::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 51.91.31.155 51.91.31.155 | 16276 (OVH) (OVH) | |
1 | 151.101.12.193 151.101.12.193 | 54113 (FASTLY) (FASTLY) | |
2 | 2606:4700:10:... 2606:4700:10::6816:225c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 7 |
ASN211849 (KAKHAROV-AS, KZ)
PTR: poc-mt32-48.oH5ikyrGuh7.ru
pay73-olx.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
pay73-olx.info
pay73-olx.info |
453 KB |
3 |
user.com
k5gaedcez4gnj2qb.user.com widget.user.com |
68 KB |
1 |
imgur.com
i.imgur.com |
17 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
729 B |
14 | 5 |
Domain | Requested by | |
---|---|---|
8 | pay73-olx.info |
pay73-olx.info
|
2 | widget.user.com |
k5gaedcez4gnj2qb.user.com
|
1 | i.imgur.com |
pay73-olx.info
|
1 | k5gaedcez4gnj2qb.user.com |
pay73-olx.info
|
1 | code.jquery.com |
pay73-olx.info
|
1 | fonts.googleapis.com |
pay73-olx.info
|
14 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
help.olx.pl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
pay73-olx.info R3 |
2021-06-09 - 2021-09-07 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-05-10 - 2021-08-02 |
3 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.user.com Certum Domain Validation CA SHA2 |
2020-10-26 - 2021-10-26 |
a year | crt.sh |
*.imgur.com DigiCert SHA2 Secure Server CA |
2020-01-15 - 2022-03-16 |
2 years | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-13 - 2021-08-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://pay73-olx.info/track?id=587530386
Frame ID: 36CA763CA1401D32B8063F5BB422450C
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Umowy sprzedaży
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
track
pay73-olx.info/ |
24 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.css
pay73-olx.info/assets/css/ |
404 KB 75 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
payments.css
pay73-olx.info/assets/css/ |
39 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
4 KB 729 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
widget.js
k5gaedcez4gnj2qb.user.com/ |
148 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WDLis1V.jpg
i.imgur.com/ |
16 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
secure.62a90a.svg
pay73-olx.info/assets/img/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
shipping.0b7110.svg
pay73-olx.info/assets/img/ |
725 B 888 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
firasans-medium.6d0873.woff
pay73-olx.info/assets/fonts/ |
225 KB 225 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 4 KB |
Font
font/truetype |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular.552ea4.woff
pay73-olx.info/assets/fonts/ |
66 KB 66 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-bold.8dd1fb.woff
pay73-olx.info/assets/fonts/ |
68 KB 69 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
widget-app.326854509e8dd3643f36.js
widget.user.com/ |
80 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
widget-actionsStore.326854509e8dd3643f36.js
widget.user.com/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OLX Group (E-commerce)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| civchat object| webpackChunkusercom_widget object| regeneratorRuntime function| parcelRequire object| UE function| userengage object| UsercomInstance0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
i.imgur.com
k5gaedcez4gnj2qb.user.com
pay73-olx.info
widget.user.com
151.101.12.193
2001:4de0:ac18::1:a:3a
2606:4700:10::6816:225c
2a00:1450:4001:82a::200a
51.91.31.155
91.243.32.48
0ecbc9da79495a5b0460d0cfca200aa6064528d86b749576c18d083386f9a8f0
0ef42d2d29ec3b9da3d9dee711145ddf5d1db098c87ce2d523af1d0420c999ca
19601dc9c8c99a0e227d86ca446759bd98dff95910e474fea5a9b4e16f5b34e9
1b725f674b3b9f763dbd7400f898e3abb5c49e038f816ba268778536f3fe4bda
3bdbebe8dcdcdcc3bcd63b11f927e0a5dd0b30ef0234e33669ea5225dee2e7d5
7a09d7f9864cd6a38fb884b31c9d63c392d54ad00d32740d20e93c3ed1587b6a
ad615bd17234f38773ad6db53398488273d13fadcec5c88fcbeb9dede4c284f3
b3eef1a27fddc5cdb1e308c5417b692a43fabda5e6cd40bb9794d3e09c069fc8
c7d79118c2e6c8c755f7a565838b3210f972b566291f6608502dbf001a62acc9
cdbbb9f4c5041b92ab9935f25996843c13d9ca198f51be5096c76731a248e6fd
de5e0262a3af6391ee01b776b710c5ca359321c44000ccf98a13ee10aa1586ba
e2b5d4752ac81478ad36860fbe67b75bad20bbee7a93e835a25283d310c78999
e89c6bb76c3c48ca4bbc5aabd73f1a5e52a20194a860cb30e619eb4cfac2ea7a
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
fa6ecbd0d617501c0282338390f79e319c2a443098bdfc37d0d77eddfb8c2e60