r4wu9i5x3c-wgze5.kinsta.page
Open in
urlscan Pro
2606:4700:7::a29f:99f5
Malicious Activity!
Public Scan
Submission: On February 08 via api from US — Scanned from US
Summary
TLS certificate: Issued by E1 on February 7th 2024. Valid for: 3 months.
This is the only time r4wu9i5x3c-wgze5.kinsta.page was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:7::... 2606:4700:7::a29f:99f5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 167.114.124.45 167.114.124.45 | 16276 (OVH) (OVH) | |
1 | 2a03:2880:f01... 2a03:2880:f012:8:face:b00c:0:1 | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 2606:4700:10:... 2606:4700:10::ac43:88d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 5 |
ASN16276 (OVH, FR)
PTR: ip45.ip-167-114-124.net
amazon.fudacioncovid19.com | |
boyss.fudacioncovid19.com |
ASN32934 (FACEBOOK, US)
static.xx.fbcdn.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
fudacioncovid19.com
amazon.fudacioncovid19.com boyss.fudacioncovid19.com |
17 KB |
1 |
amung.us
whos.amung.us — Cisco Umbrella Rank: 16645 |
26 B |
1 |
fbcdn.net
static.xx.fbcdn.net — Cisco Umbrella Rank: 955 |
1 KB |
1 |
kinsta.page
r4wu9i5x3c-wgze5.kinsta.page |
735 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
2 | amazon.fudacioncovid19.com |
r4wu9i5x3c-wgze5.kinsta.page
|
1 | whos.amung.us | |
1 | boyss.fudacioncovid19.com | |
1 | static.xx.fbcdn.net | |
1 | r4wu9i5x3c-wgze5.kinsta.page | |
6 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
r4wu9i5x3c-wgze5.kinsta.page E1 |
2024-02-07 - 2024-05-07 |
3 months | crt.sh |
www.amazon.fudacioncovid19.com R3 |
2023-12-26 - 2024-03-25 |
3 months | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2023-11-17 - 2024-02-15 |
3 months | crt.sh |
boyss.fudacioncovid19.com R3 |
2023-12-09 - 2024-03-08 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-06-11 - 2024-06-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://r4wu9i5x3c-wgze5.kinsta.page/
Frame ID: 5018D2B6750717536803031FFB934658
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
r4wu9i5x3c-wgze5.kinsta.page/ |
793 B 735 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
amazon.fudacioncovid19.com/ |
14 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
location
amazon.fudacioncovid19.com/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hlvibnBVrEb.svg
static.xx.fbcdn.net/rsrc.php/yd/r/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
954 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
401750647_1601653570640810_4087456680134260053_n.png
boyss.fudacioncovid19.com/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
26 B 26 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt undefined| to_object string| a function| __updateOrientation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amazon.fudacioncovid19.com
boyss.fudacioncovid19.com
r4wu9i5x3c-wgze5.kinsta.page
static.xx.fbcdn.net
whos.amung.us
167.114.124.45
2606:4700:10::ac43:88d
2606:4700:7::a29f:99f5
2a03:2880:f012:8:face:b00c:0:1
0cae74ee5bad20861dee4906df15d793b948297238f4da81c1b0d7adf3d25f38
260fbeb66875b6936348afe61b469beaf6141aa28977872569305962c8b6f9c2
60b2cf61f2d3e36b6a517778ac7793159eb386d3ced54310a9191f57a5f90c97
d258bd68ae1c8502b33f01ce381d5085196b074b523e64cba06b45b7a7ad30ee
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
eb72332f4adbd6d078ef8cd78d21aa114f96e299fe94aa621ea06dfc0a0db4a7