lszompsjqq.monster
Open in
urlscan Pro
172.67.199.107
Malicious Activity!
Public Scan
Effective URL: https://lszompsjqq.monster/
Submission Tags: @ecarlesi possiblethreat Search All
Submission: On December 15 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by WE1 on December 14th 2024. Valid for: 3 months.
This is the only time lszompsjqq.monster was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 172.67.199.107 172.67.199.107 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 172.67.159.63 172.67.159.63 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 149.154.167.99 149.154.167.99 | 62041 (Telegram ...) (Telegram Telegram Messenger Inc) | |
22 | 4 |
ASN62041 (Telegram Telegram Messenger Inc, VG)
t.me | |
telegram.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
lszompsjqq.monster
lszompsjqq.monster |
434 KB |
3 |
bafanglaicai.app
wu.bafanglaicai.app |
3 KB |
1 |
telegram.me
telegram.me — Cisco Umbrella Rank: 39197 |
359 B |
1 |
t.me
t.me — Cisco Umbrella Rank: 16630 |
359 B |
22 | 4 |
Domain | Requested by | |
---|---|---|
11 | lszompsjqq.monster |
lszompsjqq.monster
|
3 | wu.bafanglaicai.app |
lszompsjqq.monster
wu.bafanglaicai.app |
1 | telegram.me |
lszompsjqq.monster
|
1 | t.me |
lszompsjqq.monster
|
22 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
lszompsjqq.monster WE1 |
2024-12-14 - 2025-03-14 |
3 months | crt.sh |
bafanglaicai.app WE1 |
2024-10-22 - 2025-01-20 |
3 months | crt.sh |
*.t.me Go Daddy Secure Certificate Authority - G2 |
2024-10-06 - 2025-11-07 |
a year | crt.sh |
*.telegram.me Go Daddy Secure Certificate Authority - G2 |
2024-09-18 - 2025-10-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://lszompsjqq.monster/
Frame ID: 05B5870A08D8DE11A581EB79C1B13384
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
TelegramPage URL History Show full URLs
-
http://lszompsjqq.monster/
HTTP 307
https://lszompsjqq.monster/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://lszompsjqq.monster/
HTTP 307
https://lszompsjqq.monster/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
lszompsjqq.monster/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
redirect.js
lszompsjqq.monster/ |
325 B 725 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.d54bfa037348b154a941.js
lszompsjqq.monster/ |
290 KB 111 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.949acaf34f3882f511ff.css
lszompsjqq.monster/ |
111 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
compatTest.js
lszompsjqq.monster/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
wu.bafanglaicai.app/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notification.mp3
lszompsjqq.monster/ |
11 KB 11 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5193.75042954cc9da1f6d6ac.js
lszompsjqq.monster/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chat-bg-br.f34cc96fbfb048812820.png
lszompsjqq.monster/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chat-bg-pattern-light.ee148af944f6580293ae.png
lszompsjqq.monster/ |
266 KB 267 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
telegram-logo.1b2bb5b107f046ea9325.svg
lszompsjqq.monster/ |
932 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
307 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
244 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_websync_
t.me/ |
4 B 359 B |
Script
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_websync_
telegram.me/ |
4 B 359 B |
Script
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
3559.80b270ba0e217557b392.js
lszompsjqq.monster/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
send
wu.bafanglaicai.app/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
send
wu.bafanglaicai.app/api/ |
601 B 960 B |
Fetch
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
lszompsjqq.monster/ |
2 KB 3 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8673.1b6dd8d303b0535cc1f8.js
lszompsjqq.monster/ |
10 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2976.4e6e9b1254ce313f06c5.js
lszompsjqq.monster/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2976.4e6e9b1254ce313f06c5.js
lszompsjqq.monster/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2976.4e6e9b1254ce313f06c5.js
lszompsjqq.monster/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2976.4e6e9b1254ce313f06c5.js
lszompsjqq.monster/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- lszompsjqq.monster
- URL
- https://lszompsjqq.monster/3559.80b270ba0e217557b392.js
- Domain
- lszompsjqq.monster
- URL
- https://lszompsjqq.monster/2976.4e6e9b1254ce313f06c5.js
- Domain
- lszompsjqq.monster
- URL
- https://lszompsjqq.monster/2976.4e6e9b1254ce313f06c5.js
- Domain
- lszompsjqq.monster
- URL
- https://lszompsjqq.monster/2976.4e6e9b1254ce313f06c5.js
- Domain
- lszompsjqq.monster
- URL
- https://lszompsjqq.monster/2976.4e6e9b1254ce313f06c5.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| compatTest boolean| isCompatTestPassed object| webpackChunktelegram_t object| umami0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
lszompsjqq.monster
t.me
telegram.me
wu.bafanglaicai.app
lszompsjqq.monster
149.154.167.99
172.67.159.63
172.67.199.107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