fgfgfgf-2.easy.co Open in urlscan Pro
2406:da18:d33:5c01::1000  Malicious Activity! Public Scan

Submitted URL: http://fgfgfgf-2.easy.co/
Effective URL: https://fgfgfgf-2.easy.co/
Submission: On September 26 via automatic, source openphish — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 2406:da18:d33:5c01::1000, located in Singapore, Singapore and belongs to AMAZON-02, US. The main domain is fgfgfgf-2.easy.co.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 4th 2021. Valid for: a year.
This is the only time fgfgfgf-2.easy.co was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
1 2 2406:da18:d33... 16509 (AMAZON-02)
1 64.20.41.188 19318 (IS-AS-1)
1 67.202.114.216 32748 (STEADFAST)
3 4
Apex Domain
Subdomains
Transfer
2 easy.co
fgfgfgf-2.easy.co
1 KB
1 amung.us
whos.amung.us
30 B
1 mega-scripts.icu
mega-scripts.icu
94 KB
3 3
Domain Requested by
2 fgfgfgf-2.easy.co 1 redirects
1 whos.amung.us fgfgfgf-2.easy.co
1 mega-scripts.icu fgfgfgf-2.easy.co
3 3

This site contains no links.

Subject Issuer Validity Valid
*.easy.co
Sectigo RSA Domain Validation Secure Server CA
2021-05-04 -
2022-06-04
a year crt.sh
mega-scripts.icu
cPanel, Inc. Certification Authority
2021-09-14 -
2021-12-13
3 months crt.sh
whos.amung.us
Sectigo RSA Domain Validation Secure Server CA
2020-05-21 -
2022-05-21
2 years crt.sh

This page contains 1 frames:

Primary Page: https://fgfgfgf-2.easy.co/
Frame ID: E979BDE10326A257531B1359F6027F46
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://fgfgfgf-2.easy.co/ HTTP 301
    https://fgfgfgf-2.easy.co/ Page URL

Page Statistics

3
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

95 kB
Transfer

293 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://fgfgfgf-2.easy.co/ HTTP 301
    https://fgfgfgf-2.easy.co/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
fgfgfgf-2.easy.co/
Redirect Chain
  • http://fgfgfgf-2.easy.co/
  • https://fgfgfgf-2.easy.co/
1 KB
1 KB
Document
General
Full URL
https://fgfgfgf-2.easy.co/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2406:da18:d33:5c01::1000 Singapore, Singapore, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx / PHP/7.4.15
Resource Hash
2dde8ad038e56f9390a91fdfd0b244e82048c04f5b0c4b04de1ae71be067cbf8
Security Headers
Name Value
Strict-Transport-Security max-age=864000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
fgfgfgf-2.easy.co
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

server
nginx
date
Sun, 26 Sep 2021 13:04:17 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.4.15
cache-control
no-cache, no-store, private
set-cookie
XSRF-TOKEN=lSMKqdstA9YgWYHJ2IcgnCIfDxL89LbCJwglXq0Z; expires=Sun, 03-Oct-2021 13:04:17 GMT; Max-Age=604800; path=/; domain=fgfgfgf-2.easy.co; secure _easystore_z=LaDKUWmp0GxeRl3Hh62tSjR2K9nRv4aWDigzfHQp; path=/; domain=fgfgfgf-2.easy.co; secure; httponly _landing_page=%252F; expires=Sun, 10-Oct-2021 13:04:17 GMT; Max-Age=1209600; path=/; domain=fgfgfgf-2.easy.co; secure; httponly
content-encoding
gzip
strict-transport-security
max-age=864000
x-xss-protection
1; mode=block
x-content-type-options
nosniff

Redirect headers

Server
nginx
Date
Sun, 26 Sep 2021 13:04:16 GMT
Content-Type
text/html
Content-Length
162
Connection
keep-alive
Location
https://fgfgfgf-2.easy.co/
/
mega-scripts.icu/
239 KB
94 KB
Script
General
Full URL
https://mega-scripts.icu/?token=30948d0f85a70c317c7869682d74cced
Requested by
Host: fgfgfgf-2.easy.co
URL: https://fgfgfgf-2.easy.co/
Protocol
H2
Security
TLS 1.3, , CHACHA20_POLY1305
Server
64.20.41.188 , United States, ASN19318 (IS-AS-1, US),
Reverse DNS
thor.433eros.space
Software
LiteSpeed /
Resource Hash
770977a7e9fce3295821226c6b86a04684c335be044c86ddc772be06e3da72fc

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://fgfgfgf-2.easy.co/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 26 Sep 2021 13:04:17 GMT
content-encoding
br
server
LiteSpeed
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
cache-control
no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0
alt-svc
h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
/
whos.amung.us/pingjs/
30 B
30 B
Image
General
Full URL
https://whos.amung.us/pingjs/?k=teamfreekito&t=Blacksar%20Inc.&x=https://whos.amung.us/&y=https://whos.amung.us/&a=-1&d=0&v=27&r=8205
Requested by
Host: fgfgfgf-2.easy.co
URL: https://fgfgfgf-2.easy.co/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
67.202.114.216 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
amung.us
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://fgfgfgf-2.easy.co/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sun, 26 Sep 2021 13:04:18 GMT
content-encoding
gzip
content-type
text/javascript;charset=UTF-8
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
51 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

3 Cookies

Domain/Path Name / Value
.fgfgfgf-2.easy.co/ Name: XSRF-TOKEN
Value: lSMKqdstA9YgWYHJ2IcgnCIfDxL89LbCJwglXq0Z
.fgfgfgf-2.easy.co/ Name: _easystore_z
Value: LaDKUWmp0GxeRl3Hh62tSjR2K9nRv4aWDigzfHQp
.fgfgfgf-2.easy.co/ Name: _landing_page
Value: %252F

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=864000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block