URL: http://qeeeeewwswsweerwwerwerwrwerwerwerwere.warzonedns.com/sammy/invoce.....invocie.....invoice....invoice.doc
Submission: On September 11 via automatic , source urlhaus

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 23.249.165.218, located in Buffalo, United States and belongs to AS-COLOCROSSING - ColoCrossing, US. The main domain is qeeeeewwswsweerwwerwerwrwerwerwerwere.warzonedns.com.
This is the first time this domain was scanned on urlscan.io!

Verdict: Malicious (Score: 10/100) Show Details

  • urlscan - Score: 0
  • urlhaus - Score: 10 (URL submitted from urlhaus) -
    phishing

Domain & IP information

IP Address AS Autonomous System
1 23.249.165.218 36352 (AS-COLOCR...)
1 1
Domain
Subdomains
Transfer
1 warzonedns.com
0 B
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /php\/?([\d.]+)?/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /Win32|Win64/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
invoce.....invocie.....invoice....invoice.doc
/sammy
0
0
Document
General
Full URL
http://qeeeeewwswsweerwwerwerwrwerwerwerwere.warzonedns.com/sammy/invoce.....invocie.....invoice....invoice.doc
Protocol
HTTP/1.1
Server
23.249.165.218 Buffalo, United States, ASN36352 (AS-COLOCROSSING - ColoCrossing, US),
Reverse DNS
Software
Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/5.6.38 /
Resource Hash

Request headers

Host
qeeeeewwswsweerwwerwerwrwerwerwerwere.warzonedns.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Sep 2019 14:46:29 GMT
Server
Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/5.6.38
Last-Modified
Tue, 10 Sep 2019 07:01:33 GMT
ETag
"db8-5922d798537aa"
Accept-Ranges
bytes
Content-Length
3512
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
application/msword

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

qeeeeewwswsweerwwerwerwrwerwerwerwere.warzonedns.com


23.249.165.218