liuny.click
Open in
urlscan Pro
185.119.110.155
Malicious Activity!
Public Scan
Submission Tags: @ecarlesi threat phishing stripe Search All
Submission: On March 23 via api from IT — Scanned from GB
Summary
This is the only time liuny.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Stripe (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 185.119.110.155 185.119.110.155 | 2856 (BT-UK-AS ...) (BT-UK-AS BTnet UK Regional network) | |
4 | 2 |
ASN2856 (BT-UK-AS BTnet UK Regional network, GB)
PTR: svr101.gridhosting.co.uk
liuny.click |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
liuny.click
liuny.click |
1 MB |
0 |
stripecdn.com
Failed
b.stripecdn.com Failed |
|
4 | 2 |
Domain | Requested by | |
---|---|---|
2 | liuny.click |
liuny.click
|
0 | b.stripecdn.com Failed |
liuny.click
|
4 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
stripe.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://liuny.click/
Frame ID: F1A6B44191749D29D8FCAB6CF3516B72
Requests: 4 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: © Stripe
Search URL Search Domain Scan URL
Title: Contact
Search URL Search Domain Scan URL
Title: Privacy & terms
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
liuny.click/ |
32 KB 32 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.531530f676cc5cd496ce.css
liuny.click/css/ |
1 MB 1 MB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Sohne-latin-basic.woff2
b.stripecdn.com/manage/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
Sohne-Regular.woff
b.stripecdn.com/manage/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- b.stripecdn.com
- URL
- https://b.stripecdn.com/manage/assets/fonts/Sohne-latin-basic.woff2
- Domain
- b.stripecdn.com
- URL
- https://b.stripecdn.com/manage/assets/fonts/Sohne-Regular.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Stripe (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
b.stripecdn.com
liuny.click
b.stripecdn.com
185.119.110.155
6b2ae948b4340c69974df4cb2de64ee7353ab10e1608241d6e4400cd7d064103
9be8b71b6a390448ef26a591b8549b57a759d890353e4728e96ff5b54185459b