ligfrog.myftp.org Open in urlscan Pro
34.72.155.204  Malicious Activity! Public Scan

URL: http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
Submission: On November 28 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 34.72.155.204, located in United States and belongs to GOOGLE, US. The main domain is ligfrog.myftp.org.
This is the only time ligfrog.myftp.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Excel / PDF download (Online)

Domain & IP information

IP Address AS Autonomous System
3 34.72.155.204 15169 (GOOGLE)
3 1
Apex Domain
Subdomains
Transfer
3 myftp.org
ligfrog.myftp.org
485 KB
3 1
Domain Requested by
3 ligfrog.myftp.org ligfrog.myftp.org
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
Frame ID: FC13AD0EFBE569B279D68FEBD2A88186
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

485 kB
Transfer

486 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ligfrog.myftp.org/blondie/grasp/formation/
3 KB
2 KB
Document
General
Full URL
http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
Protocol
HTTP/1.1
Server
34.72.155.204 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
204.155.72.34.bc.googleusercontent.com
Software
Apache/2.4.29 (Ubuntu) / TinyCP
Resource Hash
ad4b4431cad484272a9b7aa20416be09e2d09cbbd22c066e3d9198b3282d2270

Request headers

Host
ligfrog.myftp.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 28 Nov 2020 01:30:03 GMT
Server
Apache/2.4.29 (Ubuntu)
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Vary
Accept-Encoding
Content-Encoding
gzip
X-Powered-By
TinyCP
Content-Length
1248
Keep-Alive
timeout=5, max=100
Content-Type
text/html; charset=UTF-8
excel-intro.png
ligfrog.myftp.org/blondie/grasp/formation/files/
45 KB
45 KB
Image
General
Full URL
http://ligfrog.myftp.org/blondie/grasp/formation/files/excel-intro.png
Requested by
Host: ligfrog.myftp.org
URL: http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
Protocol
HTTP/1.1
Server
34.72.155.204 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
204.155.72.34.bc.googleusercontent.com
Software
Apache/2.4.29 (Ubuntu) / TinyCP
Resource Hash
422c97d221bffc3da04455f1db0b4e651d132d28a5e50c561ef8c2cd081f62f7

Request headers

Referer
http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 28 Nov 2020 01:30:03 GMT
Last-Modified
Sat, 12 Oct 2019 16:06:36 GMT
Server
Apache/2.4.29 (Ubuntu)
X-Powered-By
TinyCP
ETag
"b289-594b8d1a99b00"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
45705
bg.png
ligfrog.myftp.org/blondie/grasp/formation/files/
438 KB
439 KB
Image
General
Full URL
http://ligfrog.myftp.org/blondie/grasp/formation/files/bg.png
Requested by
Host: ligfrog.myftp.org
URL: http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
Protocol
HTTP/1.1
Server
34.72.155.204 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
204.155.72.34.bc.googleusercontent.com
Software
Apache/2.4.29 (Ubuntu) / TinyCP
Resource Hash
556651bcec25ecdc6819957908ff1f796ae5aeccffd8d96c404aae5c1b14b84a

Request headers

Referer
http://ligfrog.myftp.org/blondie/grasp/formation/?email=tes@example.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 28 Nov 2020 01:30:03 GMT
ETag
"6d989-594b8d0786e00"
Last-Modified
Sat, 12 Oct 2019 16:06:16 GMT
Server
Apache/2.4.29 (Ubuntu)
X-Powered-By
TinyCP
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=5, max=100
Content-Length
448905

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Excel / PDF download (Online)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ligfrog.myftp.org
34.72.155.204
422c97d221bffc3da04455f1db0b4e651d132d28a5e50c561ef8c2cd081f62f7
556651bcec25ecdc6819957908ff1f796ae5aeccffd8d96c404aae5c1b14b84a
ad4b4431cad484272a9b7aa20416be09e2d09cbbd22c066e3d9198b3282d2270