![](/screenshots/b1aee8b2-1b46-4a94-bdcd-f673f4aa4531.png)
shrurl.xyz
Open in
urlscan Pro
2606:4700:3036::6815:190f
Malicious Activity!
Public Scan
Submission Tags: https://sinking.yachts sinking-yachts phishing Search All
Submission: On June 15 via api from CZ — Scanned from DE
Summary
TLS certificate: Issued by E5 on June 13th 2024. Valid for: 3 months.
This is the only time shrurl.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:303... 2606:4700:3036::6815:190f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.67.221.144 172.67.221.144 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
shrurl.xyz
shrurl.xyz |
3 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
3 | shrurl.xyz |
shrurl.xyz
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
shrurl.xyz E5 |
2024-06-13 - 2024-09-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://shrurl.xyz/
Frame ID: E148C6653D8D844C0CE357AD153B5BD3
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
shrurl.xyz/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email-decode.min.js
shrurl.xyz/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
shrurl.xyz/ |
272 B 676 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
task.url
Submitted on
June 15th 2024, 7:20:12 pm
UTC —
From Czech Republic
Threats:
Phishing
Scam
Comment: This domain is present in the Sinking Yachts anti-phishing list. More Info: https://sinking.yachts
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
shrurl.xyz
172.67.221.144
2606:4700:3036::6815:190f
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
3d33bb5e4b5fd1bf441cee3cb60a166720d11787bc9e3b725c9ce9ddde1dabab
76c0554e8e85ac831f53e5361f3ba824aae334cc8d1e0bd25b5a97faadd17c70