authweb-servicecashapp.duckdns.org
Open in
urlscan Pro
162.241.115.147
Malicious Activity!
Public Scan
Effective URL: https://authweb-servicecashapp.duckdns.org/?p=signin&session_id=F868FE6F975ED082034CC6B4EBC7EDE3EE992788&lang=en&country=BE
Submission: On June 21 via manual from US
Summary
TLS certificate: Issued by R3 on June 20th 2021. Valid for: 3 months.
This is the only time authweb-servicecashapp.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Cash App (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2606:4700:303... 2606:4700:3033::6815:2936 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 2606:4700:303... 2606:4700:3032::ac43:8d23 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 162.241.115.147 162.241.115.147 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
8 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-115-147.unifiedlayer.com
authweb-servicecashapp.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
duckdns.org
authweb-servicecashapp.duckdns.org |
397 KB |
2 |
bom.to
2 redirects
bom.to |
2 KB |
1 |
ito.mx
1 redirects
ito.mx |
795 B |
8 | 3 |
Domain | Requested by | |
---|---|---|
8 | authweb-servicecashapp.duckdns.org |
authweb-servicecashapp.duckdns.org
|
2 | bom.to | 2 redirects |
1 | ito.mx | 1 redirects |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.authweb-servicecashapp.duckdns.org R3 |
2021-06-20 - 2021-09-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://authweb-servicecashapp.duckdns.org/?p=signin&session_id=F868FE6F975ED082034CC6B4EBC7EDE3EE992788&lang=en&country=BE
Frame ID: 50BB98CA046C913941A36B16800FD7E1
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bom.to/6gjwqRh1AufBmP
HTTP 301
http://ito.mx/N3zy HTTP 301
https://bom.to/4HqSmhGAb0JVL HTTP 301
https://authweb-servicecashapp.duckdns.org/?ryu Page URL
- https://authweb-servicecashapp.duckdns.org/?p=signin&session_id=F868FE6F975ED082034CC6B4EBC7EDE3EE992788&lang=en&countr... Page URL
Detected technologies
Froala Editor (Rich Text Editors) ExpandDetected patterns
- html /<[^>]+class="[^"]*(?:fr-view|fr-box)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- html /<[^>]+class="[^"]*(?:fr-view|fr-box)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<[^>]+class="[^"]*(?:fr-view|fr-box)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bom.to/6gjwqRh1AufBmP
HTTP 301
http://ito.mx/N3zy HTTP 301
https://bom.to/4HqSmhGAb0JVL HTTP 301
https://authweb-servicecashapp.duckdns.org/?ryu Page URL
- https://authweb-servicecashapp.duckdns.org/?p=signin&session_id=F868FE6F975ED082034CC6B4EBC7EDE3EE992788&lang=en&country=BE Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://bom.to/6gjwqRh1AufBmP HTTP 301
- http://ito.mx/N3zy HTTP 301
- https://bom.to/4HqSmhGAb0JVL HTTP 301
- https://authweb-servicecashapp.duckdns.org/?ryu
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
authweb-servicecashapp.duckdns.org/ Redirect Chain
|
147 B 585 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
authweb-servicecashapp.duckdns.org/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash.css
authweb-servicecashapp.duckdns.org/assets/css/ |
238 KB 239 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
authweb-servicecashapp.duckdns.org/assets/js/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.js
authweb-servicecashapp.duckdns.org/assets/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash-market-rounded-medium.woff2
authweb-servicecashapp.duckdns.org/assets/fonts/ |
35 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cash-market-rounded-regular.woff2
authweb-servicecashapp.duckdns.org/assets/fonts/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.js
authweb-servicecashapp.duckdns.org/assets/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Cash App (Banking)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| preventBack function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
authweb-servicecashapp.duckdns.org
bom.to
ito.mx
162.241.115.147
2606:4700:3032::ac43:8d23
2606:4700:3033::6815:2936
32ce0116ec544d7c3a3f10163fabb110f4c8e49be67489b60957badd5acc8bc3
670d58116fc57502973b56683feda82ba18bdfe7af076836675be93dbc1e0eb6
b7b11c7e0a1fd862b4f67cc71b13263c97e28041179b70e350e65ad698f8e3b8
de531e5c7be5d41643ca0ca0eda3794751eb52275c95a774da8df60ef8729b3b
e83f48c001b68ad2019dd5b4420d4d22a73f1a00c4b18c227c928ee7761f68f8
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d