bytefx.io
Open in
urlscan Pro
103.174.102.107
Malicious Activity!
Public Scan
Submission: On September 19 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 13th 2022. Valid for: 3 months.
This is the only time bytefx.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DKB (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 103.174.102.107 103.174.102.107 | 133719 (IDIGITAL-...) (IDIGITAL-AS IDIGITALCAMP WEB SERVICES) | |
1 | 2606:4700::68... 2606:4700::6810:5814 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6812:1734 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 3 |
ASN133719 (IDIGITAL-AS IDIGITALCAMP WEB SERVICES, IN)
PTR: server.webgroww.com
bytefx.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bytefx.io
1 redirects
bytefx.io |
78 KB |
2 |
fontawesome.com
pro.fontawesome.com — Cisco Umbrella Rank: 4968 |
150 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 392 |
25 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | bytefx.io |
1 redirects
bytefx.io
|
2 | pro.fontawesome.com |
bytefx.io
pro.fontawesome.com |
1 | cdn.jsdelivr.net |
bytefx.io
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bytefx.io R3 |
2022-08-13 - 2022-11-11 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-02 - 2023-06-01 |
a year | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-12-01 - 2023-01-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bytefx.io/tests/wq/wella/
Frame ID: CF57D2632DAAC804F2B11CD34CFB5F62
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bytefx.io/tests/wq/wella
HTTP 301
https://bytefx.io/tests/wq/wella/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bytefx.io/tests/wq/wella
HTTP 301
https://bytefx.io/tests/wq/wella/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bytefx.io/tests/wq/wella/ Redirect Chain
|
18 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.1.1/dist/css/ |
159 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
pro.fontawesome.com/releases/v5.10.0/css/ |
153 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
bytefx.io/tests/wq/wella/style/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
bytefx.io/tests/wq/wella/assets/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image2.jpg
bytefx.io/tests/wq/wella/assets/ |
12 KB 12 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image3.jpg
bytefx.io/tests/wq/wella/assets/ |
29 KB 29 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
bytefx.io/tests/wq/wella/plugin/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
pro.fontawesome.com/releases/v5.10.0/webfonts/ |
120 KB 120 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DKB (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bytefx.io/ | Name: numberVictime Value: 756527 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bytefx.io
cdn.jsdelivr.net
pro.fontawesome.com
103.174.102.107
2606:4700::6810:5814
2606:4700::6812:1734
2af905d92cfd34b5413126a54f639da408166cbbcb54318e413ad5e10b5bf6ec
516b8c6244cd8970cadf4941417cc05b363c57aa2a01fb470891f2c9e9d9578e
5408d9f3668d380c3148ecc04f9401c082f980a88d86962bc906baf0d7abdb28
6095c4b2fc25c6534e68ddcbcd1fb58f2634036f75262042c215c74a9285bc79
77e04a1fe76f9430622575d1d15e9c045fd97eae73f5cca7fb2d3602851ad884
80f04717f32ea0320c5e8618fbacedd1fee3a8775ad8292140a6113551d4b5b0
b0071cd7ccef32768966b353e2ff09d13e07ab31148944e5545803232c2341e9
d27aa8bf9677cf4ef12acd7b37afc20f1f661d7c163b929ae9caf103b01fce37
de763dedf5fbf5a7f0a42ca06cccba4f37f85a35a4bcb378ad5ae886c884bfcd