Submitted URL: http://cttapt.fit/
Effective URL: https://cttapt.fit/
Submission: On June 27 via manual from PT — Scanned from PT

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 104.21.69.214, located in and belongs to CLOUDFLARENET, US. The main domain is cttapt.fit.
TLS certificate: Issued by WE1 on June 27th 2024. Valid for: 3 months.
This is the only time cttapt.fit was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Community Verdicts: Malicious1 votes Show Verdicts

Domain & IP information

IP Address AS Autonomous System
2 104.21.69.214 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 cttapt.fit
cttapt.fit
932 B
2 1
Domain Requested by
2 cttapt.fit
2 1

This site contains no links.

Subject Issuer Validity Valid
cttapt.fit
WE1
2024-06-27 -
2024-09-25
3 months crt.sh

This page contains 1 frames:

Primary Page: https://cttapt.fit/
Frame ID: E8E5FA73B5BD28379CED3A4953486CBF
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://cttapt.fit/ HTTP 307
    https://cttapt.fit/ Page URL

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://cttapt.fit/ HTTP 307
    https://cttapt.fit/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
cttapt.fit/
Redirect Chain
  • http://cttapt.fit/
  • https://cttapt.fit/
9 B
471 B
Document
General
Full URL
https://cttapt.fit/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.21.69.214 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5

Request headers

Accept-Language
pt-PT,pt;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/92.0.4515.90 Mobile/15E148 Safari/604.1

Response headers

access-control-allow-origin
*
alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
89a70980eb2d2165-MAD
content-length
9
content-type
text/plain; charset=utf-8
date
Thu, 27 Jun 2024 17:08:06 GMT
etag
W/"9-0gXL1ngzMqISxa6S1zx3F4wtLyg"
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gpXJRQTFxKBpm8xpDnmzG%2FLKh0eT2MUej13LKDaOC6cA%2FgpQZZR8fBNUCh2gRehGlxSgTutmJrPEyGj%2F0UhfMplJbVyUty0pWBEluvg2%2B7aGKdFS6JbQ%2BUc48amV"}],"group":"cf-nel","max_age":604800}
server
cloudflare

Redirect headers

Location
https://cttapt.fit/
Non-Authoritative-Reason
HttpsUpgrades
favicon.ico
cttapt.fit/
9 B
461 B
Other
General
Full URL
https://cttapt.fit/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.21.69.214 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5

Request headers

Accept-Language
pt-PT,pt;q=0.9;q=0.9
Referer
https://cttapt.fit/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/92.0.4515.90 Mobile/15E148 Safari/604.1

Response headers

date
Thu, 27 Jun 2024 17:08:06 GMT
cf-cache-status
EXPIRED
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
etag
W/"9-0gXL1ngzMqISxa6S1zx3F4wtLyg"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ky5Zdev7n4e5u0jomDTOInVF81fZPlfalFFg65o5kY%2FK3Ohc6gkvPsuUHj5oiZ%2BSV15ssuMjtlI9%2F7CsjiYTnNrqJvOdBsx38Kw9g2%2Fdv0tW1%2B5VhpjhVrNrI1Mb"}],"group":"cf-nel","max_age":604800}
content-type
text/plain; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
89a70983984e2165-MAD
alt-svc
h3=":443"; ma=86400
content-length
9

Verdicts & Comments Add Verdict or Comment


Malicious page.domain
Submitted on June 27th 2024, 5:17:16 pm UTC — From Portugal

Threats: Phishing
Brands: CTT Correios PT
Comment: Fake phishing domain. Uses Portuguese postal service brand (real domain 'ctt.pt') to target customers of banks operating in Portugal. Phish kit is viewable when a Portuguese IP is used.

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence object| sharedStorage

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: https://cttapt.fit/
Message:
Failed to load resource: the server responded with a status of 404 ()
network error URL: https://cttapt.fit/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cttapt.fit
104.21.69.214
0019dfc4b32d63c1392aa264aed2253c1e0c2fb09216f8e2cc269bbfb8bb49b5