joingrupwhatsapp18.cf Open in urlscan Pro
95.111.242.214  Malicious Activity! Public Scan

URL: http://joingrupwhatsapp18.cf/login.php
Submission: On December 16 via automatic, source openphish

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 5 HTTP transactions. The main IP is 95.111.242.214, located in Ukraine and belongs to CONTABO, DE. The main domain is joingrupwhatsapp18.cf.
This is the only time joingrupwhatsapp18.cf was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
2 95.111.242.214 51167 (CONTABO)
1 2a00:1450:400... 15169 (GOOGLE)
1 145.239.131.51 16276 (OVH)
1 2a00:1450:400... 15169 (GOOGLE)
5 4
Domain Requested by
2 joingrupwhatsapp18.cf joingrupwhatsapp18.cf
1 fonts.gstatic.com fonts.googleapis.com
1 i.ibb.co joingrupwhatsapp18.cf
1 fonts.googleapis.com joingrupwhatsapp18.cf
5 4

This site contains no links.

Subject Issuer Validity Valid
upload.video.google.com
GTS CA 1O1
2020-11-10 -
2021-02-02
3 months crt.sh
ibb.co
R3
2020-12-03 -
2021-03-03
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-11-10 -
2021-02-02
3 months crt.sh

This page contains 1 frames:

Primary Page: http://joingrupwhatsapp18.cf/login.php
Frame ID: 62C5E794B8DE13F8D1609435CA650D34
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

5
Requests

60 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

67 kB
Transfer

79 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
joingrupwhatsapp18.cf/
2 KB
986 B
Document
General
Full URL
http://joingrupwhatsapp18.cf/login.php
Protocol
HTTP/1.1
Server
95.111.242.214 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi479620.contaboserver.net
Software
LiteSpeed /
Resource Hash
c545c2c35f1dc08d9c56a66e7a8231993e44ebb048e625831644af715318d515

Request headers

Host
joingrupwhatsapp18.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Content-Length
779
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Wed, 16 Dec 2020 01:55:13 GMT
Server
LiteSpeed
fb_style.css
joingrupwhatsapp18.cf/css/
3 KB
1 KB
Stylesheet
General
Full URL
http://joingrupwhatsapp18.cf/css/fb_style.css
Requested by
Host: joingrupwhatsapp18.cf
URL: http://joingrupwhatsapp18.cf/login.php
Protocol
HTTP/1.1
Server
95.111.242.214 , Ukraine, ASN51167 (CONTABO, DE),
Reverse DNS
vmi479620.contaboserver.net
Software
LiteSpeed /
Resource Hash
5dd5413d9c5dc9802971efb610dd11c8fa5678e2ec853507749cb0d0042b9030

Request headers

Referer
http://joingrupwhatsapp18.cf/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 16 Dec 2020 01:55:13 GMT
Content-Encoding
gzip
Last-Modified
Wed, 27 May 2020 06:06:53 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1036
Expires
Wed, 23 Dec 2020 01:55:13 GMT
css
fonts.googleapis.com/
11 KB
1002 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:300,400,500,700|Teko:300,400,500
Requested by
Host: joingrupwhatsapp18.cf
URL: http://joingrupwhatsapp18.cf/css/fb_style.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e5843c1c13f4693b9c325451314a807de8287ee46c1636e943a2f99f68a596a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
http://joingrupwhatsapp18.cf/css/fb_style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Wed, 16 Dec 2020 01:55:13 GMT
server
ESF
date
Wed, 16 Dec 2020 01:55:13 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 16 Dec 2020 01:55:13 GMT
header.png
i.ibb.co/yRc51C8/
53 KB
53 KB
Image
General
Full URL
https://i.ibb.co/yRc51C8/header.png
Requested by
Host: joingrupwhatsapp18.cf
URL: http://joingrupwhatsapp18.cf/css/fb_style.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
nginx /
Resource Hash
5c4d4dde7b53da22a5ad4c30dfa48c8c9a2e7f10491fabf1fdc3863e077cde01

Request headers

Referer
http://joingrupwhatsapp18.cf/css/fb_style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 16 Dec 2020 01:55:13 GMT
last-modified
Fri, 01 Nov 2019 15:17:32 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
53765
expires
Thu, 31 Dec 2037 23:55:55 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Roboto:300,400,500,700|Teko:300,400,500
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
http://joingrupwhatsapp18.cf
Referer
https://fonts.googleapis.com/css?family=Roboto:300,400,500,700|Teko:300,400,500
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 15 Dec 2020 17:20:25 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
30888
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Wed, 15 Dec 2021 17:20:25 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated

0 Cookies