![](/screenshots/0a74f028-424f-4edc-97bd-3f8b46975096.png)
venus.exonhost.com
Open in
urlscan Pro
144.168.41.18
Malicious Activity!
Public Scan
Submission: On October 06 via automatic, source openphish — Scanned from DE
Summary
This is the only time venus.exonhost.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 144.168.41.18 144.168.41.18 | 29802 (HVC-AS) (HVC-AS) | |
3 | 1 |
ASN29802 (HVC-AS, US)
PTR: venus.exonhost.com
venus.exonhost.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
exonhost.com
venus.exonhost.com |
28 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
3 | venus.exonhost.com |
venus.exonhost.com
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://venus.exonhost.com/~aplceuk/nfc2/index2.php
Frame ID: 0085A2D87F2BF08FD404A3888CF1B423
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index2.php
venus.exonhost.com/~aplceuk/nfc2/ |
907 B 882 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NFCU-Logo.png
venus.exonhost.com/~aplceuk/nfc2/run/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
captcha.php
venus.exonhost.com/~aplceuk/nfc2/run/ |
4 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
venus.exonhost.com/ | Name: PHPSESSID Value: 860ce1018cb827cd1acd396e4693c1ab |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
venus.exonhost.com
144.168.41.18
044d93a0c99052b0f4d7d47a5454fed7a87a2f0a36c65384fe08d4db4e36198a
34a504fa5709de7150e24311011804655520da6973f5ef88210e318ac875cb0c
66c343efa59b749dcfc1a40b74d063b2283bd91e120faf76d3be453e66daf64d