URL User Request GET HTTP/2IP216.244.77.165:443
CertificateIssuerLet's Encrypt Subject4billspay.com Fingerprint2C:B8:3B:B9:55:BF:9A:28:7B:96:95:FE:E9:FB:E4:23:D7:EA:46:3C ValidityWed, 07 Feb 2024 10:52:53 GMT - Tue, 07 May 2024 10:52:52 GMT
File typeHTML document, Unicode text, UTF-8 text, with very long lines (23782), with CRLF line terminators Size344 kB (343933 bytes) Hashd8328fa3d9b248cf047cf342ab379e88 5fbc8e2605c60109dadddad3292d8d1af8dd1db5 6b0c86f0cdeaad3d1c6e44f72a448b93414a8660cdd62dc9c8e6ea7b0bd4b5f6
Analyzer | Verdict | Alert | OpenPhish | phishing | Generic/Spear Phishing |
GET /sms.php HTTP/1.1
Host: 4billspay.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
content-type: text/html; charset=UTF-8
cache-control: public, max-age=2592000
expires: Sun, 28 Apr 2024 00:03:07 GMT
content-encoding: br
vary: Accept-Encoding
date: Fri, 29 Mar 2024 00:03:07 GMT
server: LiteSpeed
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
X-Firefox-Spdy: h2
|
| 4billspay.com/sms_files/otp.png | 216.244.77.165 | 200 OK | 22 kB |
URL GET HTTP/34billspay.com/sms_files/otp.png IP216.244.77.165:443
Requested byhttps://4billspay.com/sms.php CertificateIssuerLet's Encrypt Subject4billspay.com Fingerprint2C:B8:3B:B9:55:BF:9A:28:7B:96:95:FE:E9:FB:E4:23:D7:EA:46:3C ValidityWed, 07 Feb 2024 10:52:53 GMT - Tue, 07 May 2024 10:52:52 GMT
File typePNG image data, 1080 x 1080, 8-bit/color RGBA, non-interlaced Hashc0611d10e42ed6c179a5abc9c35fa41b 1a22b9b8ed590f652fee1687f9f35b7272d73213 01350124c6bcafa0ffff25ec73ab03c9053ee2929664e61cd4288b51dca68124
Analyzer | Verdict | Alert | OpenPhish | phishing | Generic/Spear Phishing |
GET /sms_files/otp.png HTTP/1.1
Host: 4billspay.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://4billspay.com/sms.php
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
cache-control: public, max-age=31536000
expires: Sat, 29 Mar 2025 00:03:07 GMT
content-type: image/png
last-modified: Sun, 21 Jan 2024 02:51:06 GMT
accept-ranges: bytes
content-length: 21872
date: Fri, 29 Mar 2024 00:03:07 GMT
server: LiteSpeed
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
|