grubdyz.mabarinfo2.duckdns.org Open in urlscan Pro
52.229.135.175  Malicious Activity! Public Scan

URL: http://grubdyz.mabarinfo2.duckdns.org/
Submission: On October 11 via automatic, source openphish — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 5 HTTP transactions. The main IP is 52.229.135.175, located in Central, Hong Kong and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is grubdyz.mabarinfo2.duckdns.org.
This is the only time grubdyz.mabarinfo2.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
4 52.229.135.175 8075 (MICROSOFT...)
1 2 157.240.236.60 32934 (FACEBOOK)
5 2
Apex Domain
Subdomains
Transfer
4 duckdns.org
grubdyz.mabarinfo2.duckdns.org
317 KB
1 whatsapp.com
www.whatsapp.com
1 whatsapp.net
www-cdn.whatsapp.net
182 B
5 3
Domain Requested by
4 grubdyz.mabarinfo2.duckdns.org grubdyz.mabarinfo2.duckdns.org
1 www.whatsapp.com grubdyz.mabarinfo2.duckdns.org
1 www-cdn.whatsapp.net 1 redirects
5 3
Subject Issuer Validity Valid
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2021-07-21 -
2021-10-19
3 months crt.sh

This page contains 1 frames:

Primary Page: http://grubdyz.mabarinfo2.duckdns.org/
Frame ID: 6EA48067C7496C3B87A9A663CCA8EACA
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

WhatsApp Group Invite

Page Statistics

5
Requests

20 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

317 kB
Transfer

316 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
grubdyz.mabarinfo2.duckdns.org/
7 KB
7 KB
Document
General
Full URL
http://grubdyz.mabarinfo2.duckdns.org/
Protocol
HTTP/1.1
Server
52.229.135.175 Central, Hong Kong, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
29e597f41701a05f518311ad9dc83ba9bb34ca820782cde4f1708586382e3ccd

Request headers

Host
grubdyz.mabarinfo2.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Mon, 11 Oct 2021 01:31:17 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.build35e635e635e6.css
grubdyz.mabarinfo2.duckdns.org/css/v4/
240 KB
241 KB
Stylesheet
General
Full URL
http://grubdyz.mabarinfo2.duckdns.org/css/v4/style.build35e635e635e6.css
Requested by
Host: grubdyz.mabarinfo2.duckdns.org
URL: http://grubdyz.mabarinfo2.duckdns.org/
Protocol
HTTP/1.1
Server
52.229.135.175 Central, Hong Kong, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
grubdyz.mabarinfo2.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://grubdyz.mabarinfo2.duckdns.org/
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://grubdyz.mabarinfo2.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 11 Oct 2021 01:31:18 GMT
Last-Modified
Mon, 15 Apr 2019 21:53:12 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
246233
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: grubdyz.mabarinfo2.duckdns.org
URL: http://grubdyz.mabarinfo2.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
157.240.236.60 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
whatsapp-cdn-shv-02-frx5.fbcdn.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://grubdyz.mabarinfo2.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Redirect headers

location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
date
Mon, 11 Oct 2021 01:31:19 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
alt-svc
h3=":443"; ma=3600,h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
content-type
text/plain
icon-chat.png
grubdyz.mabarinfo2.duckdns.org/img/v4/
20 KB
20 KB
Image
General
Full URL
http://grubdyz.mabarinfo2.duckdns.org/img/v4/icon-chat.png
Requested by
Host: grubdyz.mabarinfo2.duckdns.org
URL: http://grubdyz.mabarinfo2.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
HTTP/1.1
Server
52.229.135.175 Central, Hong Kong, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
grubdyz.mabarinfo2.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://grubdyz.mabarinfo2.duckdns.org/css/v4/style.build35e635e635e6.css
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://grubdyz.mabarinfo2.duckdns.org/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 11 Oct 2021 01:31:19 GMT
Last-Modified
Mon, 15 Apr 2019 21:53:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
20384
18.jpg
grubdyz.mabarinfo2.duckdns.org/img/
49 KB
49 KB
Image
General
Full URL
http://grubdyz.mabarinfo2.duckdns.org/img/18.jpg
Protocol
HTTP/1.1
Server
52.229.135.175 Central, Hong Kong, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
40ba0f9f12eb97244c06c4aa8a015cb74c4314391c12a381a25bac7a1a7c32f7

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
grubdyz.mabarinfo2.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://grubdyz.mabarinfo2.duckdns.org/
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://grubdyz.mabarinfo2.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Mon, 11 Oct 2021 01:31:19 GMT
Last-Modified
Sun, 10 Oct 2021 22:41:04 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
49728

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Message:
Failed to load resource: the server responded with a status of 404 ()