www.flyingstarproject.com Open in urlscan Pro
194.163.142.38  Malicious Activity! Public Scan

URL: http://www.flyingstarproject.com/wp/GOV94213003223/au/login.html
Submission: On May 10 via manual from AU — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 194.163.142.38, located in Düsseldorf, Germany and belongs to CONTABO, DE. The main domain is www.flyingstarproject.com.
This is the only time www.flyingstarproject.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Australian Government (Government)

Domain & IP information

IP Address AS Autonomous System
1 194.163.142.38 51167 (CONTABO)
1 2
Apex Domain
Subdomains
Transfer
1 flyingstarproject.com
www.flyingstarproject.com
65 KB
1 1
Domain Requested by
1 www.flyingstarproject.com
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.flyingstarproject.com/wp/GOV94213003223/au/login.html
Frame ID: B606B166E2477FD36617C73FA6000A60
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Sign-in - myGov

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

65 kB
Transfer

350 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.html
www.flyingstarproject.com/wp/GOV94213003223/au/
233 KB
65 KB
Document
General
Full URL
http://www.flyingstarproject.com/wp/GOV94213003223/au/login.html
Protocol
HTTP/1.1
Server
194.163.142.38 Düsseldorf, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
server.superfastcloudhosting.com
Software
/
Resource Hash
24f487e722e8f6b31bf6d7580faf5b74d4b5ff20993decae07fa59a79c4dd585

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Accept-Ranges
bytes
Connection
Keep-Alive
Content-Encoding
gzip
Content-Length
66506
Content-Type
text/html
Date
Tue, 10 May 2022 05:41:30 GMT
Last-Modified
Mon, 21 Mar 2022 21:10:12 GMT
Vary
Accept-Encoding
truncated
/
113 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
42ded01e719714429c120fcb2076b685587196056c7e75306c7ba0da5fd91721

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://www.flyingstarproject.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
91e0d494b2136f506c63c13ebf1ac4a220a6e53a176ee4714505cf3703d0bdbb

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://www.flyingstarproject.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
742 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e470bb1617b294c5f4c8c456278f819d1640b90c2c15e5d237d3c0683aa32a22

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://www.flyingstarproject.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
844 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
428f159a75c5ab70e22fa870b75a7409a87b7954c427a8ca22dc996af4098c5a

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://www.flyingstarproject.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Australian Government (Government)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone

0 Cookies