vconnectcall.firetyu.xyz
Open in
urlscan Pro
23.94.50.157
Malicious Activity!
Public Scan
Effective URL: https://vconnectcall.firetyu.xyz/login.php?ss=2&ea=6616d616e64612e626572676579406b6568652e636f6d
Submission: On September 02 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 1st 2020. Valid for: 3 months.
This is the only time vconnectcall.firetyu.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 81.19.215.11 81.19.215.11 | 25369 (BANDWIDTH-AS) (BANDWIDTH-AS) | |
1 8 | 23.94.50.157 23.94.50.157 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
9 | 3 |
ASN25369 (BANDWIDTH-AS, GB)
PTR: echo.cloudns.io
uywkehe.navrasindia.com |
ASN36352 (AS-COLOCROSSING, US)
PTR: 23-94-50-157-host.colocrossing.com
vconnectcall.firetyu.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
firetyu.xyz
1 redirects
vconnectcall.firetyu.xyz |
51 KB |
1 |
navrasindia.com
uywkehe.navrasindia.com |
609 B |
0 |
ccscdn.li
Failed
cdn.ccscdn.li Failed |
|
9 | 3 |
Domain | Requested by | |
---|---|---|
8 | vconnectcall.firetyu.xyz |
1 redirects
vconnectcall.firetyu.xyz
|
1 | uywkehe.navrasindia.com | |
0 | cdn.ccscdn.li Failed |
vconnectcall.firetyu.xyz
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vconnectcall.firetyu.xyz Let's Encrypt Authority X3 |
2020-09-01 - 2020-11-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://vconnectcall.firetyu.xyz/login.php?ss=2&ea=6616d616e64612e626572676579406b6568652e636f6d
Frame ID: AAAD8183FE1831EF479A01C95C78E5F4
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://uywkehe.navrasindia.com/6616d616e64612e626572676579406b6568652e636f6d Page URL
-
https://vconnectcall.firetyu.xyz/index?ss=2&ea=6616d616e64612e626572676579406b6568652e636f6d
HTTP 302
https://vconnectcall.firetyu.xyz/login.php?ss=2&ea=6616d616e64612e626572676579406b6568652e636f6d Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://uywkehe.navrasindia.com/6616d616e64612e626572676579406b6568652e636f6d Page URL
-
https://vconnectcall.firetyu.xyz/index?ss=2&ea=6616d616e64612e626572676579406b6568652e636f6d
HTTP 302
https://vconnectcall.firetyu.xyz/login.php?ss=2&ea=6616d616e64612e626572676579406b6568652e636f6d Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
6616d616e64612e626572676579406b6568652e636f6d
uywkehe.navrasindia.com/ |
535 B 609 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
vconnectcall.firetyu.xyz/ Redirect Chain
|
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged1033.css
vconnectcall.firetyu.xyz/files/ |
103 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ou.png
vconnectcall.firetyu.xyz/files2/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
vconnectcall.firetyu.xyz/files/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left.png
vconnectcall.firetyu.xyz/files/ |
240 B 568 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
9fd503cf407e806f9db831faaf3ab8d114af28.css
cdn.ccscdn.li/odn/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-small.jpg
vconnectcall.firetyu.xyz/files2/ |
987 B 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpg
vconnectcall.firetyu.xyz/files2/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdn.ccscdn.li
- URL
- http://cdn.ccscdn.li/odn/9fd503cf407e806f9db831faaf3ab8d114af28.css?media=g8fj6D7NaQqAEikCrvNf0bbVbecBQ1YG
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| empty function| change function| myFunction2 function| myFunction object| form object| button1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vconnectcall.firetyu.xyz/ | Name: PHPSESSID Value: 6alqg1p6o4lkdrt51sff21mfjr |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.ccscdn.li
uywkehe.navrasindia.com
vconnectcall.firetyu.xyz
cdn.ccscdn.li
23.94.50.157
81.19.215.11
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
5ecdd90c315a94de0c38fb8c9ea2ea13219f37154bd613a0cf465a15a528b9d4
8b34a475187302935336bf43a2bf2a4e0adb9a1e87953ea51f6fcf0ef52a4a1d
ab50358475adae73a435466c72d1a48ab124e8ae06614663716a46dce5ac8b83
c0a0e399d7a6c8d4aab854c7127861df765af15665b4348e1ebe79219deb7af3
d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3
e4e1e65871749d18aea150643c07e0aab2057da057c6c57ec1c3c43580e1c898
ed018388c5bbcec32b5f5f8149c11f4d0b931e6e0b6dabb01d9cf7d221dcbdd0