syzpuxtop.ga
Open in
urlscan Pro
2606:4700:3034::ac43:dda6
Malicious Activity!
Public Scan
Submission: On September 30 via automatic, source openphish
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on September 29th 2020. Valid for: a year.
This is the only time syzpuxtop.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:303... 2606:4700:3034::ac43:dda6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 176.88.217.73 176.88.217.73 | 34984 (TELLCOM-AS) (TELLCOM-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:81c::2003 | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:800::2003 | 15169 (GOOGLE) (GOOGLE) | |
12 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
syzpuxtop.ga
syzpuxtop.ga |
28 KB |
3 |
gstatic.com
fonts.gstatic.com |
33 KB |
3 |
wirecard.com.tr
www.wirecard.com.tr |
14 KB |
1 |
googleapis.com
fonts.googleapis.com |
821 B |
12 | 4 |
Domain | Requested by | |
---|---|---|
5 | syzpuxtop.ga |
syzpuxtop.ga
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
3 | www.wirecard.com.tr |
syzpuxtop.ga
|
1 | fonts.googleapis.com |
syzpuxtop.ga
|
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-09-29 - 2021-09-29 |
a year | crt.sh |
*.wirecard.com.tr COMODO RSA Organization Validation Secure Server CA |
2019-04-01 - 2021-03-31 |
2 years | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-09-03 - 2020-11-26 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-09-03 - 2020-11-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://syzpuxtop.ga/payments/Add-Payments-Method.htm?type=68v3oWMXCKK_tLsDeLwd3VAxU9liAXf6jAuMsUDt2Bqkz9pszbcR5nARJnptToTOAO21psT53EcviRl
Frame ID: 0524D2EB15179812E037F916687698AB
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Add-Payments-Method.htm
syzpuxtop.ga/payments/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
botsda.css
syzpuxtop.ga/payments/ |
118 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wirecard.css
syzpuxtop.ga/payments/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webtot.css
syzpuxtop.ga/payments/ |
108 B 223 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wd.jpg
syzpuxtop.ga/payments/ |
5 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mastercard-logo.png
www.wirecard.com.tr/pgate/Assets/cppflex/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
visa-logo.png
www.wirecard.com.tr/pgate/Assets/cppflex/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-secure.png
www.wirecard.com.tr/pgate/Assets/cppflex/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 821 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-Q050 |
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-Q050 |
KFOlCnqEu92Fr1MmSU5fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| theForm function| __doPostBack2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.syzpuxtop.ga/ | Name: ARRAffinity Value: 97efb3b2352a84c6626e8d78407fd1461dd804aa0a311e009034106c6e126e95 |
|
.syzpuxtop.ga/ | Name: __cfduid Value: dcb40a14bd50cf73e05443675c718e3a61601429331 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
syzpuxtop.ga
www.wirecard.com.tr
176.88.217.73
2606:4700:3034::ac43:dda6
2a00:1450:4001:800::2003
2a00:1450:4001:802::200a
2a00:1450:4001:81c::2003
0d9fd7ccabde9b202de45ee6b65878ce9594975d8e8810b0878d3f3fa3637d0e
51c290315b5b558590011409b4c04f824b29a0ac1be5598cc615bb23b945c57d
5a09199edab1966f3ff2649e4f3ef88a261cfc7374927afbdf7cb6c3dcee796a
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
7e0f702144fda354a22118505fa707486242615ec36310b876add3c4f2320e9a
92606bd38901e67d069f2ef883715b6e5ae07d72ae3bead3ad92346528374afc
c29d415e0ee2ea91c63df65dad5bda275457074e6c3a69a4d264a2a2df4d4475
c78e76837eff7f047cfe22a4484f398c3690012913415df18344f10fb7616654
cc1b5ec49f500a6e586d1924b3b8db2b2d4d43943bf6ddb5cb0b7ab53ba5d1cc
d0cbfb1ab0f94123834567e32df7ec74a1c210793f797368d41a4b4c2732d4a0
eece6e0c65b7007ab0eb1b4998d36dafe381449525824349128efc3f86f4c91c
fc7451150df8bd96e7adfb5209e15033fbf04d2de0c63fb5a063e0894d392e76