ripple-give.net
Open in
urlscan Pro
195.208.1.102
Malicious Activity!
Public Scan
Submission: On August 07 via manual from JP
Summary
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G1 on June 18th 2019. Valid for: a year.
This is the only time ripple-give.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 195.208.1.102 195.208.1.102 | 48287 (RU-CENTER) (RU-CENTER) | |
1 | 151.101.112.193 151.101.112.193 | 54113 (FASTLY) (FASTLY - Fastly) | |
13 | 3 |
ASN48287 (RU-CENTER, RU)
PTR: std-carp2-http.nic.ru
ripple-give.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
ripple-give.net
ripple-give.net |
302 KB |
1 |
imgur.com
i.imgur.com |
11 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | ripple-give.net |
ripple-give.net
|
1 | i.imgur.com |
ripple-give.net
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.ripple-give.net Encryption Everywhere DV TLS CA - G1 |
2019-06-18 - 2020-06-17 |
a year | crt.sh |
*.imgur.com DigiCert SHA2 Secure Server CA |
2018-12-14 - 2020-02-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ripple-give.net/xrp-left/?source=post_page---------------------------
Frame ID: 22E477CBB7B05FB8DC52AD85A00E5F9E
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Clipboard.js (Miscellaneous) Expand
Detected patterns
- script /clipboard(?:-([\d.]+))?(?:\.min)?\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ripple-give.net/xrp-left/ |
61 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
clipboard.min.js.download
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js.download
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js.download
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overrides.min.css
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
shared.min.js.download
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
13 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
comments.css
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
151 KB 50 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
blockchain.css
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
250 KB 39 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
payment-request.css
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
721 B 860 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app-overrides.css
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
2 KB 822 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check.png
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PcAn0PE.jpg
i.imgur.com/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
T1X5ZPT.gif
ripple-give.net/xrp-left/114,000%20XRP%20left_files/ |
126 KB 126 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)71 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery object| jQuery111105412848104864485 string| ADDRESS number| satoshi string| show_adv object| adv_rule object| symbol_XRP object| symbol_local object| symbol string| root string| resource undefined| war_checksum boolean| min boolean| isExtension string| APP_VERSION string| APP_NAME string| IMPORTED_APP_NAME string| IMPORTED_APP_VERSION function| stripHTML function| setLocalSymbol function| setXRPSymbol undefined| names undefined| ws undefined| reconnectInterval function| webSocketConnect function| BlockFromJSON function| TransactionFromJSON function| padStr function| dateToString function| parseURLQuery function| generateURL function| formatSatoshi function| convert function| formatXRP function| sShift function| formatSymbol function| formatMoney function| formatOutput function| toggleAdv function| setAdv function| calcMoney function| setupSymbolToggle function| toggleSymbol object| _sounds function| playSound function| setupToggle function| updateQueryString function| loadScript function| SetCookie function| getCookie object| MyStore function| wait function| txid_gen function| addr_gen function| starttr function| newtr function| updateTrans object| times function| setProgress boolean| stop_progress function| updateProgress boolean| exec_copy function| copyAddress function| selectText function| addrWidthResizer object| clipboard number| trans0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
i.imgur.com
ripple-give.net
151.101.112.193
195.208.1.102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