rlbopfdwdu.duckdns.org
Open in
urlscan Pro
77.243.86.133
Malicious Activity!
Public Scan
Effective URL: https://rlbopfdwdu.duckdns.org/
Submission: On August 10 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 9th 2022. Valid for: 3 months.
This is the only time rlbopfdwdu.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: au ID (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:10:... 2606:4700:10::6816:e8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 103.80.134.86 103.80.134.86 | 3786 (LGDACOM L...) (LGDACOM LG DACOM Corporation) | |
1 | 103.80.134.49 103.80.134.49 | 3786 (LGDACOM L...) (LGDACOM LG DACOM Corporation) | |
1 13 | 77.243.86.133 77.243.86.133 | 35913 (DEDIPATH-LLC) (DEDIPATH-LLC) | |
15 | 4 |
ASN3786 (LGDACOM LG DACOM Corporation, KR)
igtbrffwdl.duckdns.org |
ASN3786 (LGDACOM LG DACOM Corporation, KR)
nzraqucauc.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
duckdns.org
1 redirects
igtbrffwdl.duckdns.org nzraqucauc.duckdns.org rlbopfdwdu.duckdns.org |
91 KB |
1 |
cutt.ly
1 redirects
cutt.ly — Cisco Umbrella Rank: 51211 |
443 B |
0 |
51.la
Failed
js.users.51.la Failed |
|
15 | 3 |
Domain | Requested by | |
---|---|---|
13 | rlbopfdwdu.duckdns.org |
1 redirects
nzraqucauc.duckdns.org
rlbopfdwdu.duckdns.org |
1 | nzraqucauc.duckdns.org |
igtbrffwdl.duckdns.org
|
1 | igtbrffwdl.duckdns.org | |
1 | cutt.ly | 1 redirects |
0 | js.users.51.la Failed |
rlbopfdwdu.duckdns.org
|
15 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
otppivytwg.duckdns.org R3 |
2022-08-09 - 2022-11-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rlbopfdwdu.duckdns.org/
Frame ID: C40BE88EC2F917898E3AD48821D8ED1D
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
TitlePage URL History Show full URLs
-
https://cutt.ly/1ZZD6gt
HTTP 301
http://igtbrffwdl.duckdns.org/ Page URL
- http://nzraqucauc.duckdns.org/ Page URL
-
http://rlbopfdwdu.duckdns.org/
HTTP 301
https://rlbopfdwdu.duckdns.org/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cutt.ly/1ZZD6gt
HTTP 301
http://igtbrffwdl.duckdns.org/ Page URL
- http://nzraqucauc.duckdns.org/ Page URL
-
http://rlbopfdwdu.duckdns.org/
HTTP 301
https://rlbopfdwdu.duckdns.org/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://cutt.ly/1ZZD6gt HTTP 301
- http://igtbrffwdl.duckdns.org/
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
igtbrffwdl.duckdns.org/ Redirect Chain
|
213 B 443 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
nzraqucauc.duckdns.org/ |
388 B 619 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
rlbopfdwdu.duckdns.org/ Redirect Chain
|
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new1.css
rlbopfdwdu.duckdns.org/static/au_order/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new2.css
rlbopfdwdu.duckdns.org/static/au_order/ |
868 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.min.js
rlbopfdwdu.duckdns.org/static/hau/ |
90 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.cookie.js
rlbopfdwdu.duckdns.org/static/hau/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
21174741.js
js.users.51.la/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
rlbopfdwdu.duckdns.org/static/au_order/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vcard.jpeg
rlbopfdwdu.duckdns.org/static/au_order/ |
32 KB 32 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fig_cc-01.png
rlbopfdwdu.duckdns.org/static/au_order/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_seven.png
rlbopfdwdu.duckdns.org/static/au_order/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_lawson.png
rlbopfdwdu.duckdns.org/static/au_order/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_ministop.png
rlbopfdwdu.duckdns.org/static/au_order/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_seicomart.png
rlbopfdwdu.duckdns.org/static/au_order/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- js.users.51.la
- URL
- https://js.users.51.la/21174741.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: au ID (Telecommunication)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery object| myDate number| year number| month number| day function| reg2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cutt.ly/ | Name: PHPSESSID Value: bs9cnelhael61ar59qrrbsojal |
|
rlbopfdwdu.duckdns.org/ | Name: sessionid Value: 07c3afcb6c7fb0e80101c40e736fe37d |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cutt.ly
igtbrffwdl.duckdns.org
js.users.51.la
nzraqucauc.duckdns.org
rlbopfdwdu.duckdns.org
js.users.51.la
103.80.134.49
103.80.134.86
2606:4700:10::6816:e8
77.243.86.133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