Effective URL: http://montekaro.xyz/check/lite2/evil/3ntlkyza=/signin.php?local.x=&Token=enhjdmJ6eGN2Yg==&S.n=1ff1de774005
Submission: On June 13 via manual from US
Summary
The main IP is 185.224.137.127, located in and belongs to SERVERIUS-AS, NL. The main domain is montekaro.xyz.
This is the first time this domain was scanned on urlscan.io!
Verdict: Malicious (Score: 100/100) Show Details
-
urlscan - Score: 100
phishingPhishing against PayPal (Financial)
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 11 | 185.224.137.127 185.224.137.127 | 50673 (SERVERIUS-AS) (SERVERIUS-AS) | |
2 2 | 172.217.23.161 172.217.23.161 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 4 | 172.217.21.233 172.217.21.233 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 2 | 172.217.21.237 172.217.21.237 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
10 | 2 |
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra15s22-in-f1.1e100.net
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s13-in-f233.1e100.net
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s13-in-f237.1e100.net
Domain Subdomains |
Transfer | |
---|---|---|
11 |
montekaro.xyz
3 redirects
|
148 KB |
4 |
blogger.com
2 redirects
|
5 KB |
2 |
google.com
2 redirects
|
789 B |
2 |
free-style-css.blogspot.com
2 redirects
|
392 B |
10 | 4 |
Domain | Requested by | |
---|---|---|
11 | montekaro.xyz |
3 redirects
montekaro.xyz
|
4 | www.blogger.com |
2 redirects
montekaro.xyz
|
2 | accounts.google.com | 2 redirects |
2 | free-style-css.blogspot.com | 2 redirects |
10 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
Subject / Issuer | Validity | Valid |
---|
Screenshot

Detected technologies

Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i

Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Detected patterns
- env /^PAYPAL$/i
Detected patterns
- env /^jQuery$/i
Stats
0
Requests
0
Ad-blocked
0
Malicious
0
%
HTTPS
0
%
IPv6
0
Domains
0
Subdomains
0
IPs
0
Countries
0
kB
Transfer
0
kB
Size
0
Cookies
0 Outgoing links
These are links going to different origins than the main page. For each link, only the first name is shown.
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Adblocked
signin.php?local.x=&Token=enhjdmJ6eGN2Yg==&S.n=1ff1de774005
/check/lite2/evil/3ntlkyza= Redirect Chain
|
4 KB 2 KB |
Document text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
blogin.g?blogspotURL=https%3A%2F%2Ffree-style-css.blogspot.com%2F&bpli=1
www.blogger.com Redirect Chain
|
0 0 |
Stylesheet text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
style.css
/check/lite2/evil/3ntlkyza=/res/css |
67 KB 15 KB |
Stylesheet text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
main-script.js
/check/lite2/evil/3ntlkyza=/res/js |
43 KB 13 KB |
Script application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
q.js
/check/lite2/evil/3ntlkyza=/res/js |
286 KB 97 KB |
Script application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
v.js
/check/lite2/evil/3ntlkyza=/res/js |
49 KB 15 KB |
Script application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
warning.css
/check/lite2/evil/3ntlkyza=/res/css |
0 0 |
Stylesheet text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
logo.png
/check/lite2/evil/3ntlkyza=/res/img |
5 KB 5 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adblocked
warning.css
/check/lite2/evil/3ntlkyza=/res/css |
0 0 |
Stylesheet text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
blogin.g?blogspotURL=https%3A%2F%2Ffree-style-css.blogspot.com%2F&bpli=1
www.blogger.com Redirect Chain
|
0 4 KB |
Image text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Redirect requests
There were HTTP redirects (301, 302) for the following requests:
Request 0- http://montekaro.xyz/check/lite2/evil
- http://montekaro.xyz/check/lite2/evil/
- http://montekaro.xyz/check/lite2/evil/3ntlkyza=/index.php
- http://montekaro.xyz/check/lite2/evil/3ntlkyza=/signin.php?local.x=&Token=enhjdmJ6eGN2Yg==&S.n=1ff1de774005
- https://free-style-css.blogspot.com/
- https://www.blogger.com/blogin.g?blogspotURL=https://free-style-css.blogspot.com/
- https://accounts.google.com/ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://free-style-css.blogspot.com/%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotUR...
- https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Ffree-style-css.blogspot.com%2F&bpli=1
- https://free-style-css.blogspot.com/
- https://www.blogger.com/blogin.g?blogspotURL=https://free-style-css.blogspot.com/
- https://accounts.google.com/ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://free-style-css.blogspot.com/%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotUR...
- https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Ffree-style-css.blogspot.com%2F&bpli=1
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan - Score: 100
Categories:Tags:
Phishing against: PayPal (Financial)
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| PAYPAL function| $ function| jQuery function| finish0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators of compromise (IoCs)
This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.
accounts.google.com free-style-css.blogspot.com montekaro.xyz www.blogger.com 172.217.21.233 172.217.21.237 172.217.23.161 185.224.137.127 0c4e24d59df467d6194fd1eec6707825626c819e55cf562bbb33e906bcffe0c9 3d6fd1d01b7b8800c81c9557eab05a0ca5858483c426e0ba9bdca515dd7b2521 692d421d5c163409a5918e802f507abbaa6bec90baa454c5252977a5b3b7ff0d 6ca98469c438fc5eef1673ae0946e9e1bb5b3397a3338d6ef9893b5298818d4f ca1415a994b05655d3a8fb4bbae4e38cfe62cfb17ecc559d1915f60bf39deb92 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 f2bfaf95a4a54d888244f7e05060cb026a3cb0c156a9a64576ff760fd567615f