appla-exodise-oi.top
Open in
urlscan Pro
2606:4700:3033::6815:3a6d
Malicious Activity!
Public Scan
Submission: On March 06 via api from US — Scanned from US
Summary
This is the only time appla-exodise-oi.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 2606:4700:303... 2606:4700:3033::6815:3a6d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:816::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
appla-exodise-oi.top
appla-exodise-oi.top |
807 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 368 |
31 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | appla-exodise-oi.top |
appla-exodise-oi.top
|
1 | ajax.googleapis.com |
appla-exodise-oi.top
|
7 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
discord.gg |
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2024-02-05 - 2024-04-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://appla-exodise-oi.top/download.html
Frame ID: 217726F049461BDF2951AE333AEACA91
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
Crypto Wallet App Download for Desktop & Mobile | Exodus DownloadFacebookTwitterYouTubeDownload Windows AppDownload For MacDownload Linux AppDownload on the App StoreDownload on Google PlayDiscordGithubYouTubeRedditTwitterSlackFacebookDetected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Discord
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
download.html
appla-exodise-oi.top/ |
1 MB 789 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
str.png
appla-exodise-oi.top/img/ |
439 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
quest.png
appla-exodise-oi.top/img/ |
965 B 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enter.png
appla-exodise-oi.top/img/ |
827 B 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
32 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
135 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
154 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
465 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
163 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
98 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
64 KB 64 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
appla-exodise-oi.top/js/ |
45 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base.js
appla-exodise-oi.top/js/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)90 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery string| lang function| chooselang function| validateWord function| submitSeed object| allowedWords function| openewseed function| openselect function| closeselect function| openmodal1 function| choosenetwork function| openpopup1 function| openpopup2 function| openpopup3 function| closemodal1 function| showother function| _x function| vib function| clickbtnww object| els__inputs number| int__maxSimbols function| clickbtn function| clickbtn2 function| opensetting function| closesetting function| openbuycrypto function| closebuycrypto function| openModalError_button function| func24 function| func12 function| funckey function| closemodal function| closemodalfirst undefined| hash function| openmulti function| openfarms function| openpool function| openiao function| opennft function| openauction function| openganna function| openbsc function| openavax function| openpolygon function| openfantom function| openharmony function| openhome function| hecooption function| ethoption function| bscoption function| openvalid function| closevalid function| lendover function| lendout function| homeover function| homeout function| farmover function| farmout function| stakeover function| stakeout function| loansover function| loansout function| changebsc function| changeheco function| changeklaytn function| choosepayklaytn function| choosepaybsc function| choosepayheco function| chooseex function| closechooseex function| openmodal function| openmynodes function| openallnodes function| openmining function| open12 function| open15 function| open18 function| open21 function| open24 function| showmore function| closeall function| bigImg function| normalImg function| showtopmenu function| openwallet function| checkform boolean| jj boolean| jj20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
appla-exodise-oi.top
2606:4700:3033::6815:3a6d
2607:f8b0:4006:816::200a
06802c36bc1e9a9498fa0a27f40888f5700e9375abd73462e8a57f295f319638
0f5e096d3aee1961879a1b175eaaf426dc06a9a0d0acafccc3aad39312c0fe3f
1ba35217c5ff557ede78bc6f98075a6a4a5554d0dca9f2ebad5958d8487d7bf1
2228de5e24d3bf0a182ff286c6ce5a2912195c28d170ee0b11c3622c4127c7cc
3b3c08bfe806e5162081110303e8aac1c487d5024754fbaf70534eb4d09f08e6
50ea9cf99223d46363b74e20ff326e21604c17a8260725c847bf2d1e43555607
5236808f3212faf10e455e34312fbadcdc5e4c5b1afb45f9a7590cd2b2f268df
78564bc49c311d520f6d3d71ea0bdacaeab8adccdccc8b9d8659607e1d7751d9
78f5429b789c474b310bacf6f3e2f49eadec3eb1d2fd93b2b318f9ec6dbb7778
80325e1a21ae04b6eab13eb563e3f2441abb4a7af602b4aff13b819869a48fc8
80f526cbaced5578a08876581b6695e26043d903e2b03f626de39d50367a569d
8df4dc082ff718db5544a7f4ad00c63b0be47bec72bf26ca9bccb174917cf167
8e90e0dace5c23eaf1ae191ee7105509184d6467c20c3b6ff69adb58bfde07ba
8eee49e3d0f4e651f9f40adfd661861997715b99d5b88103ae44d248ca6b1751
930fcac48af85fe0996c41a5eeca88d76ccaae5c565cf663e2ae8dc7d9d69512
a95e2a075992b66df0e3274c67c9baf5a98420eff92005afee45bce082c7226e
abc88b108ddb324cfa1c6e25850e790bded7defd0e2f9b55d7205c2da0b91dc8
b019538234514166ec7665359d097403358f8a4c991901983922fb4d56989f1e
c066975509832e70c923abb312f6498ba7942d54aa0467ab5c3ac0dc94381a12
c7110e3e94171e368940c7d09cc2ef1ffc8e5cfd620b4d671ced325fcc5ece93
d67ce5dbe43b047c04af2904ea7867542439f7035b8b6622873e6d32e196bb07
e519389cd8302993dfb58a7950fb5704331dccb1a826f01288f98b3798d31310
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615
f75911313e1c7802c23345ab57e754d87801581706780c993fb23ff4e0fe62ef
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d