bakupearl.az
Open in
urlscan Pro
191.101.50.190
Malicious Activity!
Public Scan
Submission: On July 20 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on May 21st 2023. Valid for: 3 months.
This is the only time bakupearl.az was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 191.101.50.190 191.101.50.190 | 46337 (WEBSITE-H...) (WEBSITE-HOSTING) | |
1 | 2a02:26f0:e2:... 2a02:26f0:e2:789::2d63 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
8 | 2 |
ASN46337 (WEBSITE-HOSTING, US)
PTR: rs207.nsresponse.com
bakupearl.az |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bakupearl.az
bakupearl.az |
5 KB |
1 |
dw.com
static.dw.com — Cisco Umbrella Rank: 96824 |
65 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | bakupearl.az |
bakupearl.az
|
1 | static.dw.com |
bakupearl.az
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bakupearl.az R3 |
2023-05-21 - 2023-08-19 |
3 months | crt.sh |
*.dw.com GeoTrust RSA CA 2018 |
2023-04-30 - 2024-04-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bakupearl.az/facebook.com-marketplace-item-733800788548953/index.html
Frame ID: 9341233F71AC85DB9659025033E9F238
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Login in your accountDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Underscore.js (JavaScript Libraries) Expand
Detected patterns
- underscore.*\.js(?:\?ver=([\d.]+))?
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gpt.js
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
0 24 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
underscore-min.js
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
0 64 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
878 B 604 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
875 B 530 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
0 24 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom.css
bakupearl.az/facebook.com-marketplace-item-733800788548953/ |
872 B 525 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
49305625_401.jpg
static.dw.com/image/ |
65 KB 65 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bakupearl.az
static.dw.com
191.101.50.190
2a02:26f0:e2:789::2d63
07be2d913cf245e810b4bf774f6e088629b1cf3245c0e3c619a7d631c91d9cd6
0a233a9c1424c8d7df9be57045b7567a831eaf98d335105515d5206af108f1de
288ed41f9fbbab315a75f6cb7dc65f42bb653f4eb64ed679c8bfc64368710247
6d18730c46e968c2310e576bb446ae1810e26ccc50ac8f5c8385d20d1dd66e21
94139e10d29a525d68e73c1fa51b4e6d66f9aa636f4b9c162c5f714244164bee
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855