
Submission: On January 14 via automatic, source openphish
Summary
This is the only time whatsappsex1.ddns.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 213.136.78.181 213.136.78.181 | 51167 (CONTABO) (CONTABO) | |
1 2 | 2a03:2880:f21... 2a03:2880:f21c:81c5:face:b00c:0:167 | 32934 (FACEBOOK) (FACEBOOK) | |
5 | 2 |
ASN51167 (CONTABO, DE)
PTR: vmi501909.contaboserver.net
whatsappsex1.ddns.net |
ASN32934 (FACEBOOK, US)
www-cdn.whatsapp.net | |
www.whatsapp.com |
Domain Subdomains |
Transfer | |
---|---|---|
4 |
whatsappsex1.ddns.net
|
98 KB |
1 |
whatsapp.com
|
0 B |
1 |
whatsapp.net
1 redirects
|
167 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
4 | whatsappsex1.ddns.net |
whatsappsex1.ddns.net
|
1 | www.whatsapp.com |
whatsappsex1.ddns.net
|
1 | www-cdn.whatsapp.net | 1 redirects |
5 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.whatsapp.com |
translate.whatsapp.com |
web.whatsapp.com |
www.whatsappbrand.com |
blog.whatsapp.com |
twitter.com |
www.facebook.com |
Subject / Issuer | Validity | Valid |
---|---|---|
*.whatsapp.net DigiCert SHA2 High Assurance Server CA |
2020-12-20 - 2021-03-19 |
3 months |
21 Outgoing links
These are links going to different origins than the main page. For each link, only the first name is shown.
- https://www.whatsapp.com/
- https://translate.whatsapp.com/
Title: Help translate WhatsApp into your language - https://www.whatsapp.com/download
Title: Download - https://www.whatsapp.com/features/
Title: Features - https://www.whatsapp.com/security/
Title: Security - https://www.whatsapp.com/download/
Title: Download - https://web.whatsapp.com/
Title: WhatsApp Web - https://www.whatsapp.com/about/
Title: About - https://www.whatsapp.com/join/
Title: Careers - https://www.whatsappbrand.com/
Title: Brand Center - https://www.whatsapp.com/contact/
Title: Get in touch - https://blog.whatsapp.com/
Title: Blog - https://www.whatsapp.com/android/
Title: Android - https://www.whatsapp.com/appstore/
Title: iPhone - https://www.whatsapp.com/wp/
Title: Windows Phone - https://www.whatsapp.com/ota/
Title: BlackBerry - https://www.whatsapp.com/nokia/
Title: Nokia - https://www.whatsapp.com/faq/
Title: FAQ - https://twitter.com/whatsapp
Title: Twitter - https://www.facebook.com/WhatsApp
Title: Facebook - https://www.whatsapp.com/legal/
Title: Privacy & Terms
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
|
7 KB 2 KB |
Document text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.build35e635e635e6.css
/css/v4 |
240 KB 49 KB |
Stylesheet text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ngentod.jpg
/img/v4 |
27 KB 28 KB |
Image image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
whatsapp-logo.svg
www.whatsapp.com/img/v4 Redirect Chain
|
0 0 |
Image text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-chat.png
/img/v4 |
20 KB 20 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Redirect requests
There were HTTP redirects (301, 302) for the following requests:
Request 3- https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
- https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
whatsappsex1.ddns.net
www-cdn.whatsapp.net
www.whatsapp.com
213.136.78.181
2a03:2880:f21c:81c5:face:b00c:0:167
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c
9f5e84d5488231c1bf6db8e128c30e2b8dcd22f8846412ff21c81c1127389f72
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4
c4a3856611ffbc7fa9f121de376124fceda988c4609523fad6a0f37d2d40c962
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855