adsokzs.co.vu
Open in
urlscan Pro
128.199.85.233
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On August 12 via api from FI — Scanned from FI
Summary
This is the only time adsokzs.co.vu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 128.199.85.233 128.199.85.233 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
10 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
co.vu
adsokzs.co.vu |
145 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
9 | adsokzs.co.vu |
adsokzs.co.vu
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://adsokzs.co.vu/zogin.html
Frame ID: 906C9A547F2BA07DDEB9828623518FCA
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 8- http://adsokzs.co.vu/img/LgoFSecoKE.png HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html HTTP 302
- http://adsokzs.co.vu/img/404.html
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
zogin.html
adsokzs.co.vu/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-KA_puvd3z6.css
adsokzs.co.vu/css/f/ |
52 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vd5Go76gH.css
adsokzs.co.vu/css/f/ |
14 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fe46Dg9Fy7.css
adsokzs.co.vu/css/f/ |
19 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GuwON2vS.css
adsokzs.co.vu/css/f/ |
342 KB 96 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uYL8jyMVYgX.css
adsokzs.co.vu/css/f/ |
80 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nborelSu4U-.css
adsokzs.co.vu/css/f/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logos_f.svg
adsokzs.co.vu/img/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
poaz.png
adsokzs.co.vu/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
404.html
adsokzs.co.vu/img/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- adsokzs.co.vu
- URL
- http://adsokzs.co.vu/img/404.html
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| mousedwn0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
adsokzs.co.vu
adsokzs.co.vu
128.199.85.233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