103.183.74.233
Open in
urlscan Pro
103.183.74.233
Malicious Activity!
Public Scan
Submission: On March 31 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 26th 2022. Valid for: 3 months.
This is the only time 103.183.74.233 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Cash App (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 103.183.74.233 103.183.74.233 | 136052 (IDNIC-IDC...) (IDNIC-IDCLOUDHOST-AS-ID PT Cloud Hosting Indonesia) | |
2 | 151.101.129.49 151.101.129.49 | 54113 (FASTLY) (FASTLY) | |
9 | 2 |
ASN136052 (IDNIC-IDCLOUDHOST-AS-ID PT Cloud Hosting Indonesia, ID)
PTR: ip233.74.183.103.in-addr.arpa.unknwn.cloudhost.asia
103.183.74.233 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
squarecdn.com
cash-f.squarecdn.com — Cisco Umbrella Rank: 17028 |
69 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
2 | cash-f.squarecdn.com |
103.183.74.233
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cashappsauhtneticationsdetails.vantechdns.com cPanel, Inc. Certification Authority |
2022-03-26 - 2022-06-24 |
3 months | crt.sh |
*.squarecdn.com Entrust Certification Authority - L1K |
2022-01-18 - 2023-02-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://103.183.74.233/cash.app/login.php
Frame ID: 04418334FC91883F3F97D6D8FA294133
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
103.183.74.233/cash.app/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.js
103.183.74.233/cash.app/assets/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash.js
103.183.74.233/cash.app/assets/ |
982 KB 982 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash.css
103.183.74.233/cash.app/assets/ |
239 KB 239 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash-market-rounded-light.woff2
103.183.74.233/cash.app/assets/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash-market-rounded-regular.woff2
103.183.74.233/cash.app/assets/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash-market-rounded-medium.woff2
103.183.74.233/cash.app/assets/ |
35 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cash-market-rounded-regular.woff2
cash-f.squarecdn.com/static/fonts/cashmarket/ |
33 KB 33 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cash-market-rounded-medium.woff2
cash-f.squarecdn.com/static/fonts/cashmarket/ |
35 KB 36 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Cash App (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cash-f.squarecdn.com
103.183.74.233
151.101.129.49
027325a2f4815056652819932e56bb69515e53c8876075c5e54f178584ae82c0
05c2eae4c5809a4cf8721574ae4c6700d2b9484528c73605c899b8dfd41f199e
0cab6ae142696ceae7265aa7f93941de14df3d4e06ac2487808d4bbf1d8fea0f
32ce0116ec544d7c3a3f10163fabb110f4c8e49be67489b60957badd5acc8bc3
7089a778b24660f4f0d185dc42ce4b13059c180f3faad3dc73ea5437719ee78c
a1abd94048e822be4d2b551ce86d9250314fb453a2b87092a6bb1138ae167c14
de531e5c7be5d41643ca0ca0eda3794751eb52275c95a774da8df60ef8729b3b