Submitted URL: http://cttapt.fit/
Effective URL: https://cttapt.fit/
Submission Tags: @phish_report
Submission: On June 27 via api from FI — Scanned from IT

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 104.21.69.214, located in and belongs to CLOUDFLARENET, US. The main domain is cttapt.fit.
TLS certificate: Issued by WE1 on June 27th 2024. Valid for: 3 months.
This is the only time cttapt.fit was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Community Verdicts: Malicious1 votes Show Verdicts

Domain & IP information

IP Address AS Autonomous System
2 104.21.69.214 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 cttapt.fit
cttapt.fit
923 B
2 1
Domain Requested by
2 cttapt.fit
2 1

This site contains no links.

Subject Issuer Validity Valid
cttapt.fit
WE1
2024-06-27 -
2024-09-25
3 months crt.sh

This page contains 1 frames:

Primary Page: https://cttapt.fit/
Frame ID: F1D695C90B52544720E97F7C86027899
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://cttapt.fit/ HTTP 307
    https://cttapt.fit/ Page URL

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://cttapt.fit/ HTTP 307
    https://cttapt.fit/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
cttapt.fit/
Redirect Chain
  • http://cttapt.fit/
  • https://cttapt.fit/
9 B
464 B
Document
General
Full URL
https://cttapt.fit/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.21.69.214 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5

Request headers

Accept-Language
it-IT,it;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

access-control-allow-origin
*
alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
89a7062f6e940e12-MXP
content-length
9
content-type
text/plain; charset=utf-8
date
Thu, 27 Jun 2024 17:05:50 GMT
etag
W/"9-0gXL1ngzMqISxa6S1zx3F4wtLyg"
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Yz84P6nfkAjincYFMucfX5ZKGuOLzWlT4LLhyQb5hTEKiSeEZBq2eedIBa9fMtQ9J3sB8bGYlH0ABTos2krkZVvAG7cYapjBLWB1Q3S8ZuKqj8SeY2IcRbHbnWgW"}],"group":"cf-nel","max_age":604800}
server
cloudflare

Redirect headers

Location
https://cttapt.fit/
Non-Authoritative-Reason
HttpsUpgrades
favicon.ico
cttapt.fit/
9 B
459 B
Other
General
Full URL
https://cttapt.fit/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.21.69.214 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5

Request headers

sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
Referer
https://cttapt.fit/
Accept-Language
it-IT,it;q=0.9;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

date
Thu, 27 Jun 2024 17:05:50 GMT
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
age
180
etag
W/"9-0gXL1ngzMqISxa6S1zx3F4wtLyg"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JXruPgItbFPD4hmIgNxTTu0oZGoNhA9luytrmb%2Bg2z8xW3V2DXY42A%2FqVb8d0J9VfgkObizmqLqjkNPUXD55exCu4t5nm4ZHzXKH2yX5flzCl9PPMtCHeeVsTlVR"}],"group":"cf-nel","max_age":604800}
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
89a706354ee60e12-MXP
alt-svc
h3=":443"; ma=86400
content-length
9

Verdicts & Comments Add Verdict or Comment


Malicious page.domain
Submitted on June 27th 2024, 5:17:28 pm UTC — From Portugal

Threats: Phishing
Brands: CTT Correios PT
Comment: Fake phishing domain. Uses Portuguese postal service brand (real domain 'ctt.pt') to target customers of banks operating in Portugal. Phish kit is viewable when a Portuguese IP is used.

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence object| sharedStorage

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: https://cttapt.fit/
Message:
Failed to load resource: the server responded with a status of 404 ()
network error URL: https://cttapt.fit/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cttapt.fit
104.21.69.214
0019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5