teamphoria.co.nz
Open in
urlscan Pro
23.111.138.149
Malicious Activity!
Public Scan
Effective URL: https://teamphoria.co.nz/yett/home.php
Submission: On May 24 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on April 17th 2023. Valid for: 3 months.
This is the only time teamphoria.co.nz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 35.189.241.61 35.189.241.61 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
11 | 23.111.138.149 23.111.138.149 | 29802 (HVC-AS) (HVC-AS) | |
11 | 1 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 61.241.189.35.bc.googleusercontent.com
4ty.me |
ASN29802 (HVC-AS, US)
PTR: cpanel-001-fla.hostingww.com
teamphoria.co.nz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
teamphoria.co.nz
teamphoria.co.nz |
235 KB |
1 |
4ty.me
1 redirects
4ty.me |
312 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
11 | teamphoria.co.nz |
teamphoria.co.nz
|
1 | 4ty.me | 1 redirects |
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
teamphoria.co.nz cPanel, Inc. Certification Authority |
2023-04-17 - 2023-07-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://teamphoria.co.nz/yett/home.php
Frame ID: 32A561D6D98276728648F18BFDE5FF49
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
myGovPage URL History Show full URLs
-
http://4ty.me/4psobq
HTTP 302
https://teamphoria.co.nz/yett/home.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://4ty.me/4psobq
HTTP 302
https://teamphoria.co.nz/yett/home.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
home.php
teamphoria.co.nz/yett/ Redirect Chain
|
12 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.8754dd535206d23bd3a4.css
teamphoria.co.nz/yett/theme/ |
201 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.3.js
teamphoria.co.nz/yett/theme/ |
253 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.svg
teamphoria.co.nz/yett/theme/ |
63 KB 20 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logow.svg
teamphoria.co.nz/yett/theme/ |
63 KB 20 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
233CC5_0_0.178b4b4de067e01b4a6a.woff
teamphoria.co.nz/yett/theme/ |
23 KB 23 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
233CC5_4_0.ac7a3250ab7b56d72578.woff
teamphoria.co.nz/yett/theme/ |
24 KB 24 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
233CC5_1_0.eab4b2b704f307744267.woff
teamphoria.co.nz/yett/theme/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ato-font-family-v2.beaf15797372d743b5f3.woff
teamphoria.co.nz/yett/theme/ |
13 KB 14 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
233CC5_2_0.6ba05a0066e602ce74a4.woff
teamphoria.co.nz/yett/theme/ |
24 KB 24 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
233CC5_1_0.5c5a73db297e0bf47816.ttf
teamphoria.co.nz/yett/theme/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery function| check function| isNumericKey function| LoadXMLDoc function| LoadXMLDocDsbl string| format object| match string| replace function| doFormat0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
4ty.me
teamphoria.co.nz
23.111.138.149
35.189.241.61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