giveaway2018.org
Open in
urlscan Pro
190.2.145.141
Malicious Activity!
Public Scan
Submission: On December 17 via manual from GB
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on November 16th 2018. Valid for: 3 months.
This is the only time giveaway2018.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 190.2.145.141 190.2.145.141 | 49981 (WORLDSTREAM) (WORLDSTREAM) | |
1 | 2a00:1450:400... 2a00:1450:4001:81b::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
17 | 2 |
ASN49981 (WORLDSTREAM, NL)
PTR: customer.worldstream.nl
giveaway2018.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
giveaway2018.org
giveaway2018.org |
687 KB |
1 |
google.com
chart.apis.google.com |
2 KB |
17 | 2 |
Domain | Requested by | |
---|---|---|
16 | giveaway2018.org |
giveaway2018.org
|
1 | chart.apis.google.com |
giveaway2018.org
|
17 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
giveaway2018.org Let's Encrypt Authority X3 |
2018-11-16 - 2019-02-14 |
3 months | crt.sh |
*.apis.google.com Google Internet Authority G3 |
2018-11-27 - 2019-02-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://giveaway2018.org/xrp.php
Frame ID: 60E3945B26232443CC7C925D0C91EAA0
Requests: 17 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Clipboard.js (Miscellaneous) Expand
Detected patterns
- script /clipboard(?:\.min)?\.js/i
- env /^Clipboard$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
xrp.php
giveaway2018.org/ |
29 KB 29 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clipboard.min.js.download
giveaway2018.org/ |
10 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
giveaway2018.org/ |
82 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js.download
giveaway2018.org/ |
27 KB 27 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
overrides.css
giveaway2018.org/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
giveaway2018.org/ |
94 KB 94 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.js
giveaway2018.org/ |
36 KB 36 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shared.js
giveaway2018.org/ |
13 KB 13 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blockchain.css
giveaway2018.org/ |
253 KB 254 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
payment-request.css
giveaway2018.org/ |
734 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-overrides.css
giveaway2018.org/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
check.png
giveaway2018.org/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chart
chart.apis.google.com/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
T1X5ZPT.gif
giveaway2018.org/ |
126 KB 126 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Montserrat-Light.ttf
giveaway2018.org/fonts/montserrat/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Montserrat-Medium.ttf
giveaway2018.org/fonts/montserrat/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Montserrat-Bold.ttf
giveaway2018.org/fonts/montserrat/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)80 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery string| ADDrESS object| jQuery111104841136856500019 number| satoshi string| show_adv object| adv_rule object| symbol_btc object| symbol_local object| symbol string| root string| resource undefined| war_checksum boolean| min boolean| isExtension string| APP_VERSION string| APP_NAME string| IMPORTED_APP_NAME string| IMPORTED_APP_VERSION function| stripHTML function| setLocalSymbol function| setBTCSymbol undefined| names undefined| ws undefined| reconnectInterval function| webSocketConnect function| BlockFromJSON function| TransactionFromJSON function| padStr function| dateToString function| parseURLQuery function| generateURL function| formatSatoshi function| convert function| formatBTC function| sShift function| formatSymbol function| formatMoney function| formatOutput function| toggleAdv function| setAdv function| calcMoney function| setupSymbolToggle function| toggleSymbol object| _sounds function| playSound function| setupToggle function| updateQueryString function| loadScript function| SetCookie function| getCookie object| MyStore function| setTooltip object| intervalId function| hideTooltip object| clipboard function| wait function| random function| uuidv4 function| bet function| removeArr function| addLink function| sub function| newtr function| insertAfter function| updateTrans object| times function| setProgress undefined| ctd object| tr string| INT string| OUT string| TXID string| TXID2 string| INCIN string| INOUT number| trans0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
chart.apis.google.com
giveaway2018.org
190.2.145.141
2a00:1450:4001:81b::200e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