cairterus.xyz
Open in
urlscan Pro
31.170.166.179
Malicious Activity!
Public Scan
Submission: On November 12 via automatic, source phishtank
Summary
This is the only time cairterus.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 31.170.166.179 31.170.166.179 | 47583 (HOSTINGER-AS) (HOSTINGER-AS) | |
10 | 156.67.222.27 156.67.222.27 | 47583 (HOSTINGER-AS) (HOSTINGER-AS) | |
12 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
mcfbadspgaes.xyz
mcfbadspgaes.xyz Failed |
58 KB |
1 |
cairterus.xyz
cairterus.xyz |
137 B |
12 | 2 |
Domain | Requested by | |
---|---|---|
10 | mcfbadspgaes.xyz |
cairterus.xyz
mcfbadspgaes.xyz |
1 | cairterus.xyz | |
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Frame:
http://mcfbadspgaes.xyz/ror232/errrr.html
Frame ID: 14982.1
Requests: 2 HTTP requests in this frame
Frame:
http://mcfbadspgaes.xyz/ror232/errrr.html
Frame ID: 15001.1
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Lua (Programming Languages) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
gorden22.php
cairterus.xyz/ccair/ |
117 B 137 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
errrr.html
mcfbadspgaes.xyz/ror232/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
errrr.html
mcfbadspgaes.xyz/ror232/ Frame 1500 |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
k7LsZ6Kzebp.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
2 KB 804 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
RdxXuLZOwAp.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
105 KB 32 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
INa-j1hStsU.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
35 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
diMQkJ1Odg6.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1Vv4bii7bxR.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1j-MOx9XPgA.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
VLogo77go.css
mcfbadspgaes.xyz/ssc/ Frame 1500 |
336 B 336 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
QSUIFyb0MPk.js
mcfbadspgaes.xyz/ssc/ Frame 1500 |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
mcfbadspgaes.xyz/ssc/ Frame 1500 |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- mcfbadspgaes.xyz
- URL
- http://mcfbadspgaes.xyz/ror232/errrr.html
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cairterus.xyz
mcfbadspgaes.xyz
mcfbadspgaes.xyz
156.67.222.27
31.170.166.179
06337152ac163e643d15926d44a76e00007fc052b6608a2de1d9571c4d85ab78
1964d6ccaecea8b0b8637931db531d86b5f96d54215e79a18778d66a6250c7a3
29c829169f16b3ef04548b1283f299affccb5a9aea7f1e36557baba80d9d72ed
318be7a402d131b658854e9a2afdb00f08682ed7d6f7a946406bb5a52be25197
3cb38c0015ac502e1101a8619a73aa550758c6c8764487287cbc59ef8cb14f82
5a4160c1b62df0b7279e552c149e3a6aa3024e3d9a0818f5170bb684956c07ee
71262a119250662e3964e7a7095df56ee35b8b0102e9bb5ba63c779ed7b01721
8440eff1a8ab22fb1a5ee0861c2913be96342ed3235b3b28bb5c295cbd706d23
a23faaf3c17c98031799d70ccff8d24f8510922e6a50ea319e93951a416aede2
cd8fb946ef1c5efd94bfe1507eb7a9fbf3e6737ff2085da1b5728a06cfb4bf9e
d13efaffcdc25843ee8f38d1117ef6584a2058a308d7c118e6fd81b7acf5f95c