joingroupwhatsapp9.xxuz.com Open in urlscan Pro
95.111.242.67  Malicious Activity! Public Scan

URL: http://joingroupwhatsapp9.xxuz.com/
Submission: On November 09 via automatic, source openphish

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 6 HTTP transactions. The main IP is 95.111.242.67, located in Ukraine and belongs to CONTABO, DE. The main domain is joingroupwhatsapp9.xxuz.com.
This is the only time joingroupwhatsapp9.xxuz.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
5 95.111.242.67 51167 (CONTABO)
1 2 2a03:2880:f21... 32934 (FACEBOOK)
6 2
Apex Domain
Subdomains
Transfer
5 xxuz.com
joingroupwhatsapp9.xxuz.com
2 MB
1 whatsapp.com
www.whatsapp.com
1 whatsapp.net
www-cdn.whatsapp.net
124 B
6 3
Domain Requested by
5 joingroupwhatsapp9.xxuz.com joingroupwhatsapp9.xxuz.com
1 www.whatsapp.com joingroupwhatsapp9.xxuz.com
1 www-cdn.whatsapp.net 1 redirects
6 3

This site contains links to these domains. Also see Links.

Domain
www.whatsapp.com
translate.whatsapp.com
web.whatsapp.com
www.whatsappbrand.com
blog.whatsapp.com
Subject Issuer Validity Valid
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2020-10-29 -
2021-01-26
3 months crt.sh

This page contains 1 frames:

Primary Page: http://joingroupwhatsapp9.xxuz.com/
Frame ID: F9739F429DBDD021C2291363A0611232
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

6
Requests

17 %
HTTPS

50 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

2342 kB
Transfer

2341 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
joingroupwhatsapp9.xxuz.com/
20 KB
20 KB
Document
General
Full URL
http://joingroupwhatsapp9.xxuz.com/
Protocol
HTTP/1.1
Server
95.111.242.67 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi445491.contaboserver.net
Software
Apache /
Resource Hash
e65deacc56c2c0bb2beadfbce24eaeaab604aceb0106f68320e1cf83cad92cfd

Request headers

Host
joingroupwhatsapp9.xxuz.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 09 Nov 2020 13:41:38 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.build35e635e6.css
joingroupwhatsapp9.xxuz.com/css/v4/
241 KB
241 KB
Stylesheet
General
Full URL
http://joingroupwhatsapp9.xxuz.com/css/v4/style.build35e635e6.css?v=32fe13a
Requested by
Host: joingroupwhatsapp9.xxuz.com
URL: http://joingroupwhatsapp9.xxuz.com/
Protocol
HTTP/1.1
Server
95.111.242.67 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi445491.contaboserver.net
Software
Apache /
Resource Hash
45dc92046e30064bee0a777e9ab0d916a4164db023a38128c88dba58c770831f

Request headers

Referer
http://joingroupwhatsapp9.xxuz.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 09 Nov 2020 13:41:38 GMT
Last-Modified
Fri, 27 Jul 2018 02:24:42 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
246597
jquery-1.12.2.min.js
joingroupwhatsapp9.xxuz.com/js/v4/
95 KB
95 KB
Script
General
Full URL
http://joingroupwhatsapp9.xxuz.com/js/v4/jquery-1.12.2.min.js
Requested by
Host: joingroupwhatsapp9.xxuz.com
URL: http://joingroupwhatsapp9.xxuz.com/
Protocol
HTTP/1.1
Server
95.111.242.67 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi445491.contaboserver.net
Software
Apache /
Resource Hash
95914789b5f3307a3718679e867d61b9d4c03f749cd2e2970570331d7d6c8ed9

Request headers

Referer
http://joingroupwhatsapp9.xxuz.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 09 Nov 2020 13:41:38 GMT
Last-Modified
Fri, 22 Sep 2017 18:12:34 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
97244
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: joingroupwhatsapp9.xxuz.com
URL: http://joingroupwhatsapp9.xxuz.com/css/v4/style.build35e635e6.css?v=32fe13a
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f21c:81c5:face:b00c:0:167 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://joingroupwhatsapp9.xxuz.com/css/v4/style.build35e635e6.css?v=32fe13a
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

status
302
date
Mon, 09 Nov 2020 13:41:38 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
content-length
0
location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
content-type
text/plain
icon-chat.png
joingroupwhatsapp9.xxuz.com/img/v4/
20 KB
20 KB
Image
General
Full URL
http://joingroupwhatsapp9.xxuz.com/img/v4/icon-chat.png
Requested by
Host: joingroupwhatsapp9.xxuz.com
URL: http://joingroupwhatsapp9.xxuz.com/css/v4/style.build35e635e6.css?v=32fe13a
Protocol
HTTP/1.1
Server
95.111.242.67 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi445491.contaboserver.net
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://joingroupwhatsapp9.xxuz.com/css/v4/style.build35e635e6.css?v=32fe13a
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 09 Nov 2020 13:41:38 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
1f.gif
joingroupwhatsapp9.xxuz.com/img/
2 MB
2 MB
Image
General
Full URL
http://joingroupwhatsapp9.xxuz.com/img/1f.gif
Requested by
Host: joingroupwhatsapp9.xxuz.com
URL: http://joingroupwhatsapp9.xxuz.com/
Protocol
HTTP/1.1
Server
95.111.242.67 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi445491.contaboserver.net
Software
Apache /
Resource Hash
3df0d1fcbc299dba4103fb94475edc57396f14be8e315536525fe0110f77d373

Request headers

Referer
http://joingroupwhatsapp9.xxuz.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 09 Nov 2020 13:41:38 GMT
Last-Modified
Fri, 02 Feb 2018 04:18:56 GMT
Server
Apache
Content-Type
image/gif
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
2012042

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| $ function| jQuery

0 Cookies