kafiarsahuwa.com
Open in
urlscan Pro
91.234.99.171
Malicious Activity!
Public Scan
Submission: On May 07 via automatic, source phishtank
Summary
This is the only time kafiarsahuwa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 91.234.99.171 91.234.99.171 | 48666 (AS-MAROSN...) (AS-MAROSNET Moscow) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
kafiarsahuwa.com
1 redirects
kafiarsahuwa.com |
293 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
11 | kafiarsahuwa.com |
1 redirects
kafiarsahuwa.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/
Frame ID: DC0C69A8AA863E3521434795789A03CE
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts
HTTP 301
http://kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts
HTTP 301
http://kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/ Redirect Chain
|
25 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.css
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/SpryAssets/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.css
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/SpryAssets/ |
2 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.js
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/SpryAssets/ |
76 KB 76 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.js
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/SpryAssets/ |
20 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropboxlogo.png
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/dropbox_files/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropboxbkg.png
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/dropbox_files/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropbox.jpeg
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/dropbox_files/ |
9 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/dropbox_files/ |
93 KB 93 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.ddslick.min.js
kafiarsahuwa.com/gothazomnab.com/bpatsellis/casts/dropbox_files/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Spry function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kafiarsahuwa.com
91.234.99.171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