gogf.000webhostapp.com
Open in
urlscan Pro
2a02:4780:dead:befc::1
Malicious Activity!
Public Scan
Submission: On March 19 via automatic, source openphish
Summary
This is the only time gogf.000webhostapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Google (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2a02:4780:dea... 2a02:4780:dead:befc::1 | 204915 (AWEX) (AWEX) | |
1 | 2606:4700:10:... 2606:4700:10::6814:432e | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
13 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn.000webhost.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
000webhostapp.com
gogf.000webhostapp.com |
143 KB |
1 |
000webhost.com
cdn.000webhost.com |
2 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | gogf.000webhostapp.com |
gogf.000webhostapp.com
|
1 | cdn.000webhost.com |
gogf.000webhostapp.com
|
13 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.000webhost.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.000webhost.com COMODO RSA Domain Validation Secure Server CA |
2018-10-19 - 2020-12-17 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://gogf.000webhostapp.com/pages/pages/index.php
Frame ID: 87C7B979FA2917D5D3F6519A50996F0C
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
List.js (JavaScript Libraries) Expand
Detected patterns
- env /^List$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
gogf.000webhostapp.com/pages/pages/ |
39 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.css
gogf.000webhostapp.com/pages/pages/SpryAssets/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.css
gogf.000webhostapp.com/pages/pages/SpryAssets/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.js
gogf.000webhostapp.com/pages/pages/SpryAssets/ |
76 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.js
gogf.000webhostapp.com/pages/pages/SpryAssets/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_strip.png
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
avatar_2x.png
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_strip_2x.png
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
universal_language_settings-21.png
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
199 B 521 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
93 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.ddslick.min.js
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer-powered-by-000webhost-white2.png
cdn.000webhost.com/000webhost/logo/ |
2 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cJZKeOuBrn4kERxqtaUH3T8E0i7KZn-EPnyo3HZu7kw.woff
gogf.000webhostapp.com/pages/pages/Google_docs_files/ |
21 KB 22 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Google (Online)24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| Spry function| $ function| jQuery function| getCookie object| notification object| hostingerLogo undefined| mainContent object| newList undefined| googleFont undefined| css undefined| style undefined| sheet undefined| button undefined| link undefined| h1Tag undefined| paragraph undefined| list undefined| listElements undefined| org_html undefined| new_html undefined| saleImage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.000webhost.com
gogf.000webhostapp.com
2606:4700:10::6814:432e
2a02:4780:dead:befc::1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