www.joingrup-wanotnotnew21-2021.ml Open in urlscan Pro
128.199.151.254  Malicious Activity! Public Scan

URL: https://www.joingrup-wanotnotnew21-2021.ml/
Submission: On February 18 via automatic, source openphish

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 5 HTTP transactions. The main IP is 128.199.151.254, located in Singapore and belongs to DIGITALOCEAN-ASN, US. The main domain is www.joingrup-wanotnotnew21-2021.ml.
TLS certificate: Issued by cPanel, Inc. Certification Authority on February 18th 2021. Valid for: 3 months.
This is the only time www.joingrup-wanotnotnew21-2021.ml was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
3 128.199.151.254 14061 (DIGITALOC...)
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 2 2a03:2880:f21... 32934 (FACEBOOK)
5 3
Domain Requested by
3 www.joingrup-wanotnotnew21-2021.ml www.joingrup-wanotnotnew21-2021.ml
1 www.whatsapp.com www.joingrup-wanotnotnew21-2021.ml
1 www-cdn.whatsapp.net 1 redirects
1 kuyou.id www.joingrup-wanotnotnew21-2021.ml
5 4
Subject Issuer Validity Valid
joingrup-wanotnotnew21-2021.ml
cPanel, Inc. Certification Authority
2021-02-18 -
2021-05-19
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-11-20 -
2021-11-19
a year crt.sh
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2021-02-10 -
2021-05-10
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.joingrup-wanotnotnew21-2021.ml/
Frame ID: 47E3791F666898F80DD08A8ECA537FE5
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

100 %
HTTPS

67 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

337 kB
Transfer

336 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.joingrup-wanotnotnew21-2021.ml/
7 KB
7 KB
Document
General
Full URL
https://www.joingrup-wanotnotnew21-2021.ml/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
128.199.151.254 , Singapore, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
9883936b7bc8eb17a48acecd62cd15a2bfae6aae974094531438490e9d7a5434

Request headers

Host
www.joingrup-wanotnotnew21-2021.ml
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 18 Feb 2021 13:36:04 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.build35e635e635e6.css
www.joingrup-wanotnotnew21-2021.ml/css/v4/
240 KB
241 KB
Stylesheet
General
Full URL
https://www.joingrup-wanotnotnew21-2021.ml/css/v4/style.build35e635e635e6.css
Requested by
Host: www.joingrup-wanotnotnew21-2021.ml
URL: https://www.joingrup-wanotnotnew21-2021.ml/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
128.199.151.254 , Singapore, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Referer
https://www.joingrup-wanotnotnew21-2021.ml/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 18 Feb 2021 13:36:04 GMT
Last-Modified
Tue, 29 Sep 2020 08:05:06 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
246233
notnot-lidiawaty-20200901103504.jpg
kuyou.id/content/images/
69 KB
69 KB
Image
General
Full URL
https://kuyou.id/content/images/notnot-lidiawaty-20200901103504.jpg
Requested by
Host: www.joingrup-wanotnotnew21-2021.ml
URL: https://www.joingrup-wanotnotnew21-2021.ml/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6815:1a5a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bb6720829ec5e8e6ee854f18def1730f37a76f1449c5278927197d8d04fa4520

Request headers

Referer
https://www.joingrup-wanotnotnew21-2021.ml/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 18 Feb 2021 13:36:04 GMT
cf-cache-status
HIT
nel
{"report_to":"cf-nel","max_age":604800}
age
39
content-length
70406
cf-request-id
0856f3ea5e00004e6eca9ce000000001
last-modified
Sat, 19 Sep 2020 15:56:17 GMT
server
cloudflare
etag
"11306-5afaca8560a40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=8rlmPh00ECQ9i2HyvEPzbHKKrGvq3YXiBedV%2BO7bawF%2B%2BXz%2Ft4VmqkOXnmWQBPbaToEbMEIieXKbHtQrhSGCjMvAkUOvsNrpov7F5MtawI3l7tPbAg%3D%3D"}]}
content-type
image/jpeg
cache-control
max-age=1800
accept-ranges
bytes
cf-ray
6238228a2c934e6e-FRA
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: www.joingrup-wanotnotnew21-2021.ml
URL: https://www.joingrup-wanotnotnew21-2021.ml/css/v4/style.build35e635e635e6.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f21c:81c5:face:b00c:0:167 , United States, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.joingrup-wanotnotnew21-2021.ml/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
date
Thu, 18 Feb 2021 13:36:04 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
content-type
text/plain
icon-chat.png
www.joingrup-wanotnotnew21-2021.ml/img/v4/
20 KB
20 KB
Image
General
Full URL
https://www.joingrup-wanotnotnew21-2021.ml/img/v4/icon-chat.png
Requested by
Host: www.joingrup-wanotnotnew21-2021.ml
URL: https://www.joingrup-wanotnotnew21-2021.ml/css/v4/style.build35e635e635e6.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
128.199.151.254 , Singapore, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Referer
https://www.joingrup-wanotnotnew21-2021.ml/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 18 Feb 2021 13:36:04 GMT
Last-Modified
Tue, 29 Sep 2020 08:05:06 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
20384

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

0 Cookies