www.peel.world
Open in
urlscan Pro
151.139.128.10
Malicious Activity!
Public Scan
Effective URL: http://www.peel.world/static/lps/f2J4u4N3/?installer_id=15&affiliate_id=14&postback_params=cid%3Dzr97e3d4c0ec3611e88e8...
Submission: On November 19 via api from DE
Summary
This is the only time www.peel.world was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fake Adobe UpdateDomain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 5.79.79.210 5.79.79.210 | 60781 (LEASEWEB-...) (LEASEWEB-NL-AMS-01 Netherlands) | |
2 | 52.55.176.112 52.55.176.112 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 1 | 185.59.220.21 185.59.220.21 | 60068 (CDN77) (CDN77) | |
11 | 151.139.128.10 151.139.128.10 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:815::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2606:4700::68... 2606:4700::6810:5714 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
16 | 5 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-55-176-112.compute-1.amazonaws.com
usd.jehoiakim-fau.com |
ASN60068 (CDN77, GB)
PTR: frankfurt-20.cdn77.com
www.peh9u5q4pc.download |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
www.peel.world |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn.jsdelivr.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
peel.world
www.peel.world |
286 KB |
2 |
googleapis.com
fonts.googleapis.com ajax.googleapis.com |
31 KB |
2 |
jehoiakim-fau.com
usd.jehoiakim-fau.com |
3 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net |
1 KB |
1 |
peh9u5q4pc.download
1 redirects
www.peh9u5q4pc.download |
624 B |
1 |
kiddlogger.net
1 redirects
kiddlogger.net |
395 B |
16 | 6 |
Domain | Requested by | |
---|---|---|
11 | www.peel.world |
usd.jehoiakim-fau.com
www.peel.world ajax.googleapis.com |
2 | usd.jehoiakim-fau.com |
usd.jehoiakim-fau.com
|
1 | cdn.jsdelivr.net |
www.peel.world
|
1 | ajax.googleapis.com |
www.peel.world
|
1 | fonts.googleapis.com |
www.peel.world
|
1 | www.peh9u5q4pc.download | 1 redirects |
1 | kiddlogger.net | 1 redirects |
16 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.maxinstaller.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2018-10-30 - 2019-01-22 |
3 months | crt.sh |
ssl363648.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-10-27 - 2019-05-05 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.peel.world/static/lps/f2J4u4N3/?installer_id=15&affiliate_id=14&postback_params=cid%3Dzr97e3d4c0ec3611e88e8c1202cd3db6be971cbc2dca1246e1b6d6088073ac7db1034052a0d1d392a0f3&channel_id=tango-sos-ykElV27K
Frame ID: 2FDB5098E9FAE54314494D7CADEF0292
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://kiddlogger.net/
HTTP 302
http://usd.jehoiakim-fau.com/zcvisitor/97e3d4c0-ec36-11e8-8e8c-1202cd3db6be?campaignid=7f5a6540-63d3-11e8... Page URL
- http://usd.jehoiakim-fau.com/zcredirect?visitid=97e3d4c0-ec36-11e8-8e8c-1202cd3db6be&type=js&browserWidth... Page URL
-
http://www.peh9u5q4pc.download/static/lps/f2J4u4N3/?installer_id=15&affiliate_id=14&postback_params=cid%3Dz...
HTTP 302
http://www.peel.world/static/lps/f2J4u4N3/?installer_id=15&affiliate_id=14&postback_params=cid%3Dz... Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Terms of Use
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://kiddlogger.net/
HTTP 302
http://usd.jehoiakim-fau.com/zcvisitor/97e3d4c0-ec36-11e8-8e8c-1202cd3db6be?campaignid=7f5a6540-63d3-11e8-8f79-0e9c191f3024 Page URL
- http://usd.jehoiakim-fau.com/zcredirect?visitid=97e3d4c0-ec36-11e8-8e8c-1202cd3db6be&type=js&browserWidth=1600&browserHeight=1200&iframeDetected=false Page URL
-
http://www.peh9u5q4pc.download/static/lps/f2J4u4N3/?installer_id=15&affiliate_id=14&postback_params=cid%3Dzr97e3d4c0ec3611e88e8c1202cd3db6be971cbc2dca1246e1b6d6088073ac7db1034052a0d1d392a0f3&channel_id=tango-sos-ykElV27K
HTTP 302
http://www.peel.world/static/lps/f2J4u4N3/?installer_id=15&affiliate_id=14&postback_params=cid%3Dzr97e3d4c0ec3611e88e8c1202cd3db6be971cbc2dca1246e1b6d6088073ac7db1034052a0d1d392a0f3&channel_id=tango-sos-ykElV27K Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://kiddlogger.net/ HTTP 302
- http://usd.jehoiakim-fau.com/zcvisitor/97e3d4c0-ec36-11e8-8e8c-1202cd3db6be?campaignid=7f5a6540-63d3-11e8-8f79-0e9c191f3024
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
97e3d4c0-ec36-11e8-8e8c-1202cd3db6be
usd.jehoiakim-fau.com/zcvisitor/ Redirect Chain
|
1012 B 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zcredirect
usd.jehoiakim-fau.com/ |
622 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
www.peel.world/static/lps/f2J4u4N3/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
9 KB 872 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
js.cookie.min.js
cdn.jsdelivr.net/npm/js-cookie@2/src/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.peel.world/static/lps/f2J4u4N3/css/ |
19 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-all.min.css
www.peel.world/static/lps/f2J4u4N3/css/ |
43 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adobe-flash-icon_sm.png
www.peel.world/static/lps/f2J4u4N3/img/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flash-big.png
www.peel.world/static/lps/f2J4u4N3/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
www.peel.world/static/lps/f2J4u4N3/js/ |
926 B 754 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SFUIDisplay-Regular.woff
www.peel.world/static/lps/f2J4u4N3/fonts/ |
65 KB 65 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SFUIDisplay-Black.woff
www.peel.world/static/lps/f2J4u4N3/fonts/ |
66 KB 66 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SFUIDisplay-Bold.woff
www.peel.world/static/lps/f2J4u4N3/fonts/ |
71 KB 72 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
user-get
www.peel.world/ |
125 B 581 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OK
www.peel.world/log/14/46241349/7/ |
204 B 696 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fake Adobe Update8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Cookies function| setEvents function| getParamsFromUrl function| call function| closepopup function| animation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'self'; script-src 'self' 'unsafe-inline' |
X-Content-Security-Policy | default-src 'self'; script-src 'self' 'unsafe-inline' |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
fonts.googleapis.com
kiddlogger.net
usd.jehoiakim-fau.com
www.peel.world
www.peh9u5q4pc.download
151.139.128.10
185.59.220.21
2606:4700::6810:5714
2a00:1450:4001:80b::200a
2a00:1450:4001:815::200a
5.79.79.210
52.55.176.112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