Submitted URL: https://nam03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%40hotmail.com%7Cc82c...
Effective URL: http://wyzxyey.com/classimg/agf/
Submission: On September 29 via manual from US

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 6 HTTP transactions. The main IP is 222.188.81.133, located in Nanjing, China and belongs to CHINANET-BACKBONE No.31,Jin-rong Street, CN. The main domain is wyzxyey.com.
This is the only time wyzxyey.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 104.47.41.28 8075 (MICROSOFT...)
1 1 207.46.100.50 8075 (MICROSOFT...)
1 2 222.188.81.133 4134 (CHINANET-...)
4 203.114.72.5 134451 (NME-INDON...)
6 3
Domain Requested by
4 langsungkurus.com langsungkurus.com
2 wyzxyey.com 1 redirects
1 na01.safelinks.protection.outlook.com 1 redirects
1 nam03.safelinks.protection.outlook.com 1 redirects
6 4

This site contains no links.

Subject Issuer Validity Valid

This page contains 2 frames:

Frame: http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Frame ID: 25875.1
Requests: 2 HTTP requests in this frame

Frame: http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Frame ID: 25906.1
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://nam03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%... HTTP 302
    https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%... HTTP 302
    http://wyzxyey.com/classimg/agf HTTP 301
    http://wyzxyey.com/classimg/agf/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /IIS(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /IIS(?:\/([\d.]+))?/i

Page Statistics

6
Requests

0 %
HTTPS

0 %
IPv6

3
Domains

4
Subdomains

3
IPs

3
Countries

34 kB
Transfer

44 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://nam03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%40hotmail.com%7Cc82c69a4e75a42e6e9a008d5077644c3%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636423126894273505&sdata=McCkTL9G4ahwCJkJtgingIM1LtJp0knUH1vQnvb4s88%3D&reserved=0 HTTP 302
    https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%40hotmail.com%7Cc82c69a4e75a42e6e9a008d5077644c3%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636423126894273505&sdata=McCkTL9G4ahwCJkJtgingIM1LtJp0knUH1vQnvb4s88%3D&reserved=0 HTTP 302
    http://wyzxyey.com/classimg/agf HTTP 301
    http://wyzxyey.com/classimg/agf/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/ HTTP 302
  • http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
wyzxyey.com/classimg/agf/
Redirect Chain
  • https://nam03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%40hotmail.com%7Cc82c69a4e75a42e6e9a008d5077644c3%7C84df9e7fe9f640afb435aaa...
  • https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwyzxyey.com%2Fclassimg%2Fagf&data=02%7C01%7Cfrankperrelli%40hotmail.com%7Cc82c69a4e75a42e6e9a008d5077644c3%7C84df9e7fe9f640afb435aaaa...
  • http://wyzxyey.com/classimg/agf
  • http://wyzxyey.com/classimg/agf/
118 B
118 B
Document
General
Full URL
http://wyzxyey.com/classimg/agf/
Protocol
HTTP/1.1
Server
222.188.81.133 Nanjing, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
Microsoft-IIS/6.0 / ASP.NET
Resource Hash
7350323ccae19aa805fa71e1960d4efa3a0b29d3fed3e7f2a7533a67b3318481

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
wyzxyey.com
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

Date
Fri, 29 Sep 2017 21:34:31 GMT
Last-Modified
Fri, 29 Sep 2017 21:15:40 GMT
Server
Microsoft-IIS/6.0
X-Powered-By
ASP.NET
ETag
"ae72351a6839d31:d3c"
Content-Type
text/html
Accept-Ranges
bytes
Content-Location
http://wyzxyey.com/classimg/agf/index.htm
Content-Length
118

Redirect headers

Location
http://wyzxyey.com/classimg/agf/
Date
Fri, 29 Sep 2017 21:34:31 GMT
Server
Microsoft-IIS/6.0
X-Powered-By
ASP.NET
Content-Length
155
Content-Type
text/html
bidon.html
langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/
Redirect Chain
  • http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/
  • http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
0
0

bidon.html
langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/ Frame 2590
2 KB
722 B
Document
General
Full URL
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Protocol
HTTP/1.1
Server
203.114.72.5 , Singapore, ASN134451 (NME-INDONESIA-AS-AP NewMedia Express Pte Ltd, ID),
Reverse DNS
jkt05.dewaweb.com
Software
LiteSpeed /
Resource Hash
3d3053925c1fd552829363a992e06652a478ad22f372ebe43be2d6b785a6afd8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
langsungkurus.com
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://wyzxyey.com/classimg/agf/
Connection
keep-alive
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
Referer
http://wyzxyey.com/classimg/agf/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

Date
Fri, 29 Sep 2017 21:12:22 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 14 Feb 2017 05:21:10 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
text/html
Connection
close
Accept-Ranges
bytes
Content-Length
722
xvx.js
langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/ Frame 2590
12 KB
3 KB
Script
General
Full URL
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/xvx.js
Requested by
Host: langsungkurus.com
URL: http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Protocol
HTTP/1.1
Server
203.114.72.5 , Singapore, ASN134451 (NME-INDONESIA-AS-AP NewMedia Express Pte Ltd, ID),
Reverse DNS
jkt05.dewaweb.com
Software
LiteSpeed /
Resource Hash
344ce7ae9a0179e949d1daf2b1811828294ec092ebdd622a7d8f2f379e801823
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
langsungkurus.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
Accept
*/*
Referer
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Connection
keep-alive
Cache-Control
no-cache
Referer
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

Date
Fri, 29 Sep 2017 21:12:22 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Mon, 30 Sep 2013 19:35:58 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
2931
Expires
Fri, 06 Oct 2017 21:12:22 GMT
dnt2.png
langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/mux/ Frame 2590
488 B
488 B
Image
General
Full URL
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/mux/dnt2.png
Requested by
Host: langsungkurus.com
URL: http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Protocol
HTTP/1.1
Server
203.114.72.5 , Singapore, ASN134451 (NME-INDONESIA-AS-AP NewMedia Express Pte Ltd, ID),
Reverse DNS
jkt05.dewaweb.com
Software
LiteSpeed /
Resource Hash
c6e6675ab07437b9a94008915e98c15e15caa14a11686781e58e6fe14a3afb9f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
langsungkurus.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Connection
keep-alive
Cache-Control
no-cache
Referer
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

Date
Fri, 29 Sep 2017 21:12:22 GMT
X-Content-Type-Options
nosniff
Last-Modified
Thu, 15 May 2014 06:54:14 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
488
Expires
Fri, 06 Oct 2017 21:12:22 GMT
dnt1.png
langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/mux/ Frame 2590
30 KB
30 KB
Image
General
Full URL
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/mux/dnt1.png
Requested by
Host: langsungkurus.com
URL: http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Protocol
HTTP/1.1
Server
203.114.72.5 , Singapore, ASN134451 (NME-INDONESIA-AS-AP NewMedia Express Pte Ltd, ID),
Reverse DNS
jkt05.dewaweb.com
Software
LiteSpeed /
Resource Hash
cefdc828084844edb5690c4ce2e8e348efa7b9e51ae6694acd3eac8d4793d5cf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
langsungkurus.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
Connection
keep-alive
Cache-Control
no-cache
Referer
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/61.0.3163.100 Safari/537.36

Response headers

Date
Fri, 29 Sep 2017 21:12:22 GMT
X-Content-Type-Options
nosniff
Last-Modified
Thu, 15 May 2014 06:38:16 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30251
Expires
Fri, 06 Oct 2017 21:12:22 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
langsungkurus.com
URL
http://langsungkurus.com/rosoiew/thepaypallogin/uspaypalonline/asereva/bidon.html?onlineunitedstatesesslmyeiraccountloginLogintomyeirunitedstatesdonow

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies