newgrubwhatsapp.cf
Open in
urlscan Pro
13.88.0.150
Malicious Activity!
Public Scan
Submission: On December 25 via api from JP — Scanned from JP
Summary
This is the only time newgrubwhatsapp.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 13.88.0.150 13.88.0.150 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
12 | 2a03:2880:f00... 2a03:2880:f00f:8:face:b00c:0:1 | 32934 (FACEBOOK) (FACEBOOK) | |
15 | 2 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
newgrubwhatsapp.cf |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
fbcdn.net
static.xx.fbcdn.net |
179 KB |
3 |
newgrubwhatsapp.cf
newgrubwhatsapp.cf |
119 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
12 | static.xx.fbcdn.net |
newgrubwhatsapp.cf
static.xx.fbcdn.net |
3 | newgrubwhatsapp.cf |
newgrubwhatsapp.cf
static.xx.fbcdn.net |
15 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.whatsapp.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2021-10-03 - 2022-01-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://newgrubwhatsapp.cf/
Frame ID: D43A6590C4D2FB39D914BBC6E9D00F37
Requests: 15 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
newgrubwhatsapp.cf/ |
244 KB 41 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2pHP5xrv6KN.css
static.xx.fbcdn.net/rsrc.php/v3/yU/l/0,cross/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5B9R2lqywN1.css
static.xx.fbcdn.net/rsrc.php/v3/yx/l/0,cross/ |
222 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zOdqciBFLvK.css
static.xx.fbcdn.net/rsrc.php/v3/yl/l/0,cross/ |
10 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
28bZN702Ikw.css
static.xx.fbcdn.net/rsrc.php/v3/yc/l/0,cross/ |
745 B 724 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7n_BeVS2Sch.js
static.xx.fbcdn.net/rsrc.php/v3/yI/r/ |
306 KB 83 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
36B424nhiL4.svg
static.xx.fbcdn.net/rsrc.php/ym/r/ |
9 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
lOol7j-zq4u.svg
static.xx.fbcdn.net/rsrc.php/yz/r/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ioxK2Ojkb1E.js
static.xx.fbcdn.net/rsrc.php/v3/ys/r/ |
6 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
group.jpeg
newgrubwhatsapp.cf/img/ |
76 KB 76 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
URSNyudEoKP.js
static.xx.fbcdn.net/rsrc.php/v3/yG/r/ |
36 KB 12 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
d623pSa5MoD.js
static.xx.fbcdn.net/rsrc.php/v3i7M54/yU/l/en_US/ |
75 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
VdSN32O1rVd.js
static.xx.fbcdn.net/rsrc.php/v3iqES4/y1/l/en_US/ |
87 KB 26 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cN-N4Eu_deZ.js
static.xx.fbcdn.net/rsrc.php/v3/yv/r/ |
7 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
bz
newgrubwhatsapp.cf/ajax/ |
1 KB 1 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)65 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
number| _cstart function| envFlush object| Env number| __DEV__ function| CavalryLogger function| __annotator function| __bodyWrapper function| __t function| __w function| emptyFunction function| FB_enumerate function| __m object| babelHelpers function| define function| require function| importDefault function| importNamespace function| requireDynamic function| requireLazy function| __d function| $RefreshReg$ function| $RefreshSig$ function| getErrorSafe object| ErrorGuard object| ErrorSerializer object| ErrorUtils function| Arbiter object| JSCC function| $ function| ge object| Parent object| TimeSlice function| goURI object| Bootloader object| PageEvents function| _domcontentready function| onloadRegister_DEPRECATED function| onloadRegister function| onafterloadRegister_DEPRECATED function| onafterloadRegister function| onleaveRegister function| onbeforeunloadRegister function| onunloadRegister function| $E number| __bigPipeFactory string| _script_path object| onloadhooks function| now_inl number| __bigPipeFR number| __bigPipeCtor object| bigPipe object| PageHooks function| _domreadyHook function| _onloadHook function| runHook function| runHooks function| keep_window_set_as_loaded object| domreadyhooks function| AsyncRequest object| onbeforeunloadhooks boolean| domready object| __FB_STORE object| onafterunloadhooks object| onunloadhooks boolean| loaded0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
newgrubwhatsapp.cf
static.xx.fbcdn.net
13.88.0.150
2a03:2880:f00f:8:face:b00c:0:1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