spectatorsservecounterstrikew.web.id
Open in
urlscan Pro
205.144.171.207
Malicious Activity!
Public Scan
Submission: On January 25 via automatic, source phishtank — Scanned from DE
Summary
This is the only time spectatorsservecounterstrikew.web.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 205.144.171.207 205.144.171.207 | 7296 (ALCHEMYNET) (ALCHEMYNET) | |
1 | 2a00:1450:400... 2a00:1450:4001:82b::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 51.210.32.106 51.210.32.106 | 16276 (OVH) (OVH) | |
2 | 2a00:1450:400... 2a00:1450:400e:803::2003 | 15169 (GOOGLE) (GOOGLE) | |
8 | 4 |
ASN7296 (ALCHEMYNET, US)
PTR: 205-144-171-207.alchemy.net
spectatorsservecounterstrikew.web.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
spectatorsservecounterstrikew.web.id
spectatorsservecounterstrikew.web.id |
5 KB |
2 |
gstatic.com
fonts.gstatic.com |
32 KB |
2 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 13610 |
25 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 47 |
1 KB |
8 | 4 |
Domain | Requested by | |
---|---|---|
3 | spectatorsservecounterstrikew.web.id |
spectatorsservecounterstrikew.web.id
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | i.ibb.co |
spectatorsservecounterstrikew.web.id
|
1 | fonts.googleapis.com |
spectatorsservecounterstrikew.web.id
|
8 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2021-12-27 - 2022-03-21 |
3 months | crt.sh |
ibb.co R3 |
2021-12-05 - 2022-03-05 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-12-27 - 2022-03-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://spectatorsservecounterstrikew.web.id/ctres.php
Frame ID: 710ED916048B43AB4FB2CF79ECEF97C6
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
ScureDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
ctres.php
spectatorsservecounterstrikew.web.id/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
spectatorsservecounterstrikew.web.id/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logos_f.svg
spectatorsservecounterstrikew.web.id/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5-G4-yv-J-bs-F.png
i.ibb.co/LJH5JR7/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
789.png
i.ibb.co/cb1jyjf/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v29/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v29/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
i.ibb.co
spectatorsservecounterstrikew.web.id
205.144.171.207
2a00:1450:4001:82b::200a
2a00:1450:400e:803::2003
51.210.32.106
043a67f768fc7eadd84edcca6dc5ae899a1a9a327890cde538b2959be6678cc2
0eaeadb58e6995ba85eccb6198aaef77eeb1d4b66699e4e1f3fc10eb6adfcdb9
23b63901118c24a99f0ad345bac03bdb85fc5b8d4f0f484c205602148d1551e1
4cc7adeeb16801d61bdc2216ef1184d4c39180be43604d577505583832db9012
9531e96099e973b3d1c291f3e60419d8fe4730f46de8a492fccd2b4c962c96ce
98f64742553ba9826aa3927848a6cd7aa23ba08f90f0d8b08fdb6a6a09e62107
cc46322d5c4d41da447f26f7fa714827f2ec9a112968c12ef5736c7494985eca
f347058b7d3f97fdef94951b72c56d1eb0f0f3ad8f4935208b03c4e8f11312e7