pegestreajnsopertasriorea.co.vu
Open in
urlscan Pro
199.102.48.33
Malicious Activity!
Public Scan
Effective URL: http://pegestreajnsopertasriorea.co.vu/confirmid.php
Submission: On July 05 via api from LU — Scanned from DE
Summary
This is the only time pegestreajnsopertasriorea.co.vu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 199.102.48.33 199.102.48.33 | 35937 (DATABANK-...) (DATABANK-MARQUISNET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 217.182.228.53 217.182.228.53 | 16276 (OVH) (OVH) | |
1 | 2a00:1450:400... 2a00:1450:4001:828::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:82b::200a | 15169 (GOOGLE) (GOOGLE) | |
10 | 5 |
ASN35937 (DATABANK-MARQUISNET, US)
PTR: 33-48-102-199.zayo.com
pegestreajnsopertasriorea.co.vu |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
co.vu
pegestreajnsopertasriorea.co.vu |
6 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 307 fonts.googleapis.com — Cisco Umbrella Rank: 71 |
32 KB |
1 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 12315 |
1 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2211 |
25 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
6 | pegestreajnsopertasriorea.co.vu |
pegestreajnsopertasriorea.co.vu
|
1 | fonts.googleapis.com |
pegestreajnsopertasriorea.co.vu
|
1 | ajax.googleapis.com |
pegestreajnsopertasriorea.co.vu
|
1 | i.ibb.co |
pegestreajnsopertasriorea.co.vu
|
1 | stackpath.bootstrapcdn.com |
pegestreajnsopertasriorea.co.vu
|
10 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
ibb.co R3 |
2022-06-07 - 2022-09-05 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-06-06 - 2022-08-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://pegestreajnsopertasriorea.co.vu/confirmid.php
Frame ID: 0E12D9BEE85FB0DB697B2775306C100E
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Security Checkup | FacebookPage URL History Show full URLs
- http://pegestreajnsopertasriorea.co.vu/ Page URL
- http://pegestreajnsopertasriorea.co.vu/confirmid.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://pegestreajnsopertasriorea.co.vu/ Page URL
- http://pegestreajnsopertasriorea.co.vu/confirmid.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
pegestreajnsopertasriorea.co.vu/ |
1 KB 852 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
confirmid.php
pegestreajnsopertasriorea.co.vu/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
becak.css
pegestreajnsopertasriorea.co.vu/css/ |
987 B 758 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
galon.css
pegestreajnsopertasriorea.co.vu/css/ |
864 B 685 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logos_f.svg
pegestreajnsopertasriorea.co.vu/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
789.png
i.ibb.co/T19ghq4/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.0/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popup.js
pegestreajnsopertasriorea.co.vu/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
166 B 604 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fonts.googleapis.com
i.ibb.co
pegestreajnsopertasriorea.co.vu
stackpath.bootstrapcdn.com
199.102.48.33
217.182.228.53
2606:4700::6812:bcf
2a00:1450:4001:828::200a
2a00:1450:4001:82b::200a
030ca94172c8f114ef7435b91ad9833cf04ec34cafd61a8f8e823beca83444c8
5b0fbe5b7ad705f6a937c4998ad02f73d8f0d976fe231b74aef0ec996990c93a
6740e82292e448feee46c5259340b064311408bff00075b479ba7027261582db
9531e96099e973b3d1c291f3e60419d8fe4730f46de8a492fccd2b4c962c96ce
ad1cfa188596f637a725cbc9709f2fc9f8e815f3265189127f4a4477e7c31c98
e90c2ac288456628d84d66ba1e64eadf10038add08245cb8de0e6be35ab55b4f
f347058b7d3f97fdef94951b72c56d1eb0f0f3ad8f4935208b03c4e8f11312e7
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e