![](/screenshots/9baccb7d-acb2-413b-bdf1-428684cb4e83.png)
loungelander.com
Open in
urlscan Pro
81.16.141.158
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On September 06 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on August 19th 2023. Valid for: 3 months.
This is the only time loungelander.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 81.16.141.158 81.16.141.158 | 57271 (BITWEB-AS) (BITWEB-AS) | |
1 | 1 |
ASN57271 (BITWEB-AS, RU)
PTR: 235019.bitweb.ru
loungelander.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
loungelander.com
loungelander.com |
138 B |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | loungelander.com | |
1 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
loungelander.com R3 |
2023-08-19 - 2023-11-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://loungelander.com/0/0/0/4875dfbdac558020ef6d0477337bf7c/9/2-212/212-212-133490
Frame ID: 0A01E7C8B76063DBF7CBE9111E6970C8
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
212-212-133490
loungelander.com/0/0/0/4875dfbdac558020ef6d0477337bf7c/9/2-212/ |
0 138 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
September 6th 2023, 12:41:14 am
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN SPYWARE: https://loungelander.com/0/0/0/4875dfbdac558020ef6d0477337bf7c/9/2-212/212-212-133490 sent by RUSSIAN MALNET using harvested emails and MALICIOUS websites: https://travelexplorer.site http://dillardedu.org https://kengitnet.com https://loungelander.com https://incisionsnip.bio https://holecrow.com https://digitalwizoffers.com http://www.lopkeyh.online https://licht-solar.de http://cody112melton.site http://www.sqrr.online https://lvkanvtxcx.hadsqgadsqdq.nl http://dfisshel.com
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
loungelander.com
81.16.141.158
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855