zeewong86.000webhostapp.com
Open in
urlscan Pro
145.14.145.95
Malicious Activity!
Public Scan
Submission: On April 26 via automatic, source openphish
Summary
This is the only time zeewong86.000webhostapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Alibaba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 145.14.145.95 145.14.145.95 | 204915 (AWEX) (AWEX) | |
1 1 | 151.139.237.11 151.139.237.11 | 54104 (AS-STACKPATH) (AS-STACKPATH - netDNA) | |
1 | 151.101.112.133 151.101.112.133 | 54113 (FASTLY) (FASTLY - Fastly) | |
5 | 2 |
ASN54113 (FASTLY - Fastly, US)
raw.githubusercontent.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
000webhostapp.com
1 redirects
zeewong86.000webhostapp.com |
387 KB |
1 |
githubusercontent.com
raw.githubusercontent.com |
3 KB |
1 |
rawgit.com
1 redirects
cdn.rawgit.com |
319 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
5 | zeewong86.000webhostapp.com |
1 redirects
zeewong86.000webhostapp.com
|
1 | raw.githubusercontent.com |
zeewong86.000webhostapp.com
|
1 | cdn.rawgit.com | 1 redirects |
5 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.000webhost.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/
Frame ID: DE96C203AE43E1246C8F121FF051EB5A
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://zeewong86.000webhostapp.com/alibaba/alibaba/alibaba
HTTP 301
http://zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/ Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://zeewong86.000webhostapp.com/alibaba/alibaba/alibaba
HTTP 301
http://zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://cdn.rawgit.com/000webhost/logo/e9bd13f7/footer-powered-by-000webhost-white2.png HTTP 301
- https://raw.githubusercontent.com/000webhost/logo/e9bd13f7/footer-powered-by-000webhost-white2.png
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img2.png
zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/images/ |
327 KB 328 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img1.jpg
zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/images/ |
54 KB 55 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img3.gif
zeewong86.000webhostapp.com/alibaba/alibaba/alibaba/images/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer-powered-by-000webhost-white2.png
raw.githubusercontent.com/000webhost/logo/e9bd13f7/ Redirect Chain
|
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Alibaba (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.rawgit.com
raw.githubusercontent.com
zeewong86.000webhostapp.com
145.14.145.95
151.101.112.133
151.139.237.11
14b2fa8d58bda0d4cc5b1ed884143684bf36d58784619ef66ac0845c5405c6f0
736480857134b27d22d1999eeb1cdd4eb9ace8d0e2c2d739d26e27627fe2f9b1
c3de8a20b257b3e3edadd946d59bbee31d90f6f84ed6e9619904669199c0461e
c55290da88f9b88dcc6e593fa17a5281841b40f4324557c75cc5a2c5eb96f6ac
f789f6aa5304d63550e35f144eb65f131104ecb1e38cfacd51f7f63792579503