www.1000.tatar
Open in
urlscan Pro
151.248.118.36
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On July 27 via api from FI — Scanned from FI
Summary
This is the only time www.1000.tatar was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 151.248.118.36 151.248.118.36 | 197695 (AS-REG) (AS-REG) | |
2 | 1 |
ASN197695 (AS-REG, RU)
PTR: 151-248-118-36.cloudvps.regruhosting.ru
www.1000.tatar |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
1000.tatar
www.1000.tatar |
5 KB |
2 | 1 |
Domain | Requested by | |
---|---|---|
2 | www.1000.tatar |
www.1000.tatar
|
2 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.1000.tatar/
Frame ID: 2F1496D4EA56CBEFA600DFD6C23D3A83
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.1000.tatar/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
www.1000.tatar/assets/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
July 27th 2023, 2:06:17 am
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN MALWARE sent by large botnet targeting email addresses obtained from DATA BREACH using malicious websites: http://www.1000.tatar https://survey.rest http://www.1000.tatar https://www.greywish.com https://roadmasterwarranty.com http://www.gino-gelati.com https://tatalina.foundation https://www.greywish.com https://makeyoumine.co https://trkendo.com https://thehiddenorgan.com http://www.montagee.shop https://survey.rest https://hop.clickbank.net
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| updateCountdown function| submitForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.1000.tatar
151.248.118.36
161d0961994dd86814fafba6edd6fa7a75d17b19b2e60e1ee01adaa9ea19dadc
5384fa87e039fa9bc53d3d377c84b83e81962a1fa6460bb156bd08b15f5d2475