tssa1.ga
Open in
urlscan Pro
207.38.82.208
Malicious Activity!
Public Scan
Submission: On November 29 via manual from GB
Summary
This is the only time tssa1.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 207.38.82.208 207.38.82.208 | 30083 (AS-30083-...) (AS-30083-GO-DADDY-COM-LLC) | |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | tssa1.ga |
tssa1.ga
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://tssa1.ga/yoga/
Frame ID: B0EAA06C15480766DB29DE62BB58D897
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
tssa1.ga/yoga/ |
21 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
tssa1.ga/yoga/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lainnya.png
tssa1.ga/yoga/img/ |
233 B 525 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cari.png
tssa1.ga/yoga/img/ |
806 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kamera.png
tssa1.ga/yoga/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.jpg
tssa1.ga/yoga/img/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpg
tssa1.ga/yoga/img/ |
15 KB 16 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
k.jpg
tssa1.ga/yoga/img/ |
26 KB 27 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.jpg
tssa1.ga/yoga/img/ |
28 KB 28 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.jpg
tssa1.ga/yoga/img/ |
21 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.jpg
tssa1.ga/yoga/img/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.jpg
tssa1.ga/yoga/img/ |
33 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.jpg
tssa1.ga/yoga/img/ |
36 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg2.jpg
tssa1.ga/yoga/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
tssa1.ga
207.38.82.208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