joingrup-dewasa.ooguy.com Open in urlscan Pro
185.34.52.182  Malicious Activity! Public Scan

URL: http://joingrup-dewasa.ooguy.com/
Submission: On November 20 via automatic, source openphish

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 5 HTTP transactions. The main IP is 185.34.52.182, located in Vilnius, Lithuania and belongs to VPSNET-AS, LT. The main domain is joingrup-dewasa.ooguy.com.
This is the only time joingrup-dewasa.ooguy.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
4 185.34.52.182 61053 (VPSNET-AS)
1 2 2a03:2880:f22... 32934 (FACEBOOK)
5 2
Apex Domain
Subdomains
Transfer
4 ooguy.com
joingrup-dewasa.ooguy.com
1 MB
1 whatsapp.com
www.whatsapp.com
1 whatsapp.net
www-cdn.whatsapp.net
167 B
5 3
Domain Requested by
4 joingrup-dewasa.ooguy.com joingrup-dewasa.ooguy.com
1 www.whatsapp.com joingrup-dewasa.ooguy.com
1 www-cdn.whatsapp.net 1 redirects
5 3
Subject Issuer Validity Valid
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2020-10-29 -
2021-01-26
3 months crt.sh

This page contains 1 frames:

Primary Page: http://joingrup-dewasa.ooguy.com/
Frame ID: 4A992FC10F20659667763581AFCB09C2
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

5
Requests

20 %
HTTPS

50 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

1345 kB
Transfer

1542 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
joingrup-dewasa.ooguy.com/
7 KB
2 KB
Document
General
Full URL
http://joingrup-dewasa.ooguy.com/
Protocol
HTTP/1.1
Server
185.34.52.182 Vilnius, Lithuania, ASN61053 (VPSNET-AS, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
a4d7cf5da73f0042d8175505735ce8c3ae6bf2fc5e3ea8533c9e712f0a1d14ee

Request headers

Host
joingrup-dewasa.ooguy.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Content-Length
2077
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Fri, 20 Nov 2020 02:20:19 GMT
Server
LiteSpeed
style.build35e635e635e6.css
joingrup-dewasa.ooguy.com/css/v4/
240 KB
49 KB
Stylesheet
General
Full URL
http://joingrup-dewasa.ooguy.com/css/v4/style.build35e635e635e6.css
Requested by
Host: joingrup-dewasa.ooguy.com
URL: http://joingrup-dewasa.ooguy.com/
Protocol
HTTP/1.1
Server
185.34.52.182 Vilnius, Lithuania, ASN61053 (VPSNET-AS, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Referer
http://joingrup-dewasa.ooguy.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 20 Nov 2020 02:20:19 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 07:32:12 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
49325
Expires
Fri, 27 Nov 2020 02:20:19 GMT
lonte.jpg
joingrup-dewasa.ooguy.com/img/v4/
1 MB
1 MB
Image
General
Full URL
http://joingrup-dewasa.ooguy.com/img/v4/lonte.jpg
Requested by
Host: joingrup-dewasa.ooguy.com
URL: http://joingrup-dewasa.ooguy.com/
Protocol
HTTP/1.1
Server
185.34.52.182 Vilnius, Lithuania, ASN61053 (VPSNET-AS, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
5f2e4b0097e35d49447dde3e60e5a33e8c5e79a78e3d60b5072f10342040a04a

Request headers

Referer
http://joingrup-dewasa.ooguy.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 20 Nov 2020 02:20:19 GMT
Last-Modified
Tue, 24 Mar 2020 07:32:10 GMT
Server
LiteSpeed
Content-Type
image/jpeg
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1304409
Expires
Fri, 27 Nov 2020 02:20:19 GMT
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: joingrup-dewasa.ooguy.com
URL: http://joingrup-dewasa.ooguy.com/css/v4/style.build35e635e635e6.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f22d:c5:face:b00c:0:167 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://joingrup-dewasa.ooguy.com/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
date
Fri, 20 Nov 2020 02:20:19 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
content-type
text/plain
icon-chat.png
joingrup-dewasa.ooguy.com/img/v4/
20 KB
20 KB
Image
General
Full URL
http://joingrup-dewasa.ooguy.com/img/v4/icon-chat.png
Requested by
Host: joingrup-dewasa.ooguy.com
URL: http://joingrup-dewasa.ooguy.com/css/v4/style.build35e635e635e6.css
Protocol
HTTP/1.1
Server
185.34.52.182 Vilnius, Lithuania, ASN61053 (VPSNET-AS, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Referer
http://joingrup-dewasa.ooguy.com/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 20 Nov 2020 02:20:19 GMT
Last-Modified
Tue, 24 Mar 2020 07:32:10 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
20384
Expires
Fri, 27 Nov 2020 02:20:19 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated

0 Cookies