uk123gbgma.temp.swtest.ru
Open in
urlscan Pro
77.222.61.114
Malicious Activity!
Public Scan
Effective URL: http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/authen.php?id=83102946
Submission: On September 08 via manual from NZ
Summary
This is the only time uk123gbgma.temp.swtest.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Royal Mail (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a00:1450:400... 2a00:1450:4001:814::2013 | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 3.220.113.157 3.220.113.157 | 14618 (AMAZON-AES) (AMAZON-AES) | |
14 | 77.222.61.114 77.222.61.114 | 44112 (SWEB-AS) (SWEB-AS) | |
2 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2) | |
16 | 2 |
ASN15169 (GOOGLE, US)
hr891.infusion-links.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-220-113-157.compute-1.amazonaws.com
rebrand.ly |
ASN44112 (SWEB-AS, RU)
PTR: vh287.sweb.ru
uk123gbgma.temp.swtest.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
swtest.ru
uk123gbgma.temp.swtest.ru |
118 KB |
2 |
fontawesome.com
use.fontawesome.com |
70 KB |
1 |
rebrand.ly
1 redirects
rebrand.ly |
401 B |
1 |
infusion-links.com
1 redirects
hr891.infusion-links.com |
190 B |
16 | 4 |
Domain | Requested by | |
---|---|---|
14 | uk123gbgma.temp.swtest.ru |
uk123gbgma.temp.swtest.ru
|
2 | use.fontawesome.com |
uk123gbgma.temp.swtest.ru
use.fontawesome.com |
1 | rebrand.ly | 1 redirects |
1 | hr891.infusion-links.com | 1 redirects |
16 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.fontawesome.com DigiCert SHA2 Secure Server CA |
2019-10-28 - 2020-12-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/authen.php?id=83102946
Frame ID: AA2E574A9F68CE21CACD75352991C139
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://hr891.infusion-links.com/api/v1/click/4507673779372032/4955126156623872&umid=724e6b74-dad9-4125-9b9f-...
HTTP 303
https://rebrand.ly/o8ync15vbn656?inf_contact_key=ad93482fd2292bbf7199d546e9cfe3fe680f8914173f91... HTTP 301
http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/?inf_contact_key=ad93482fd2292bbf7199d546e9cfe3fe... Page URL
- http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/authen.php?id=83102946 Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
- html /<link[^>]* href="https:\/\/use\.fontawesome\.com\/releases\/v([^>]+)\/css\//i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://hr891.infusion-links.com/api/v1/click/4507673779372032/4955126156623872&umid=724e6b74-dad9-4125-9b9f-843a7a02de86&auth=2e1b1c721d44101085fca6affa5063d710a155bd-3d522dbb2b2c2207e1f533bae06633673293a305
HTTP 303
https://rebrand.ly/o8ync15vbn656?inf_contact_key=ad93482fd2292bbf7199d546e9cfe3fe680f8914173f9191b1c0223e68310bb1 HTTP 301
http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/?inf_contact_key=ad93482fd2292bbf7199d546e9cfe3fe680f8914173f9191b1c0223e68310bb1 Page URL
- http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/authen.php?id=83102946 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://hr891.infusion-links.com/api/v1/click/4507673779372032/4955126156623872&umid=724e6b74-dad9-4125-9b9f-843a7a02de86&auth=2e1b1c721d44101085fca6affa5063d710a155bd-3d522dbb2b2c2207e1f533bae06633673293a305 HTTP 303
- https://rebrand.ly/o8ync15vbn656?inf_contact_key=ad93482fd2292bbf7199d546e9cfe3fe680f8914173f9191b1c0223e68310bb1 HTTP 301
- http://uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/?inf_contact_key=ad93482fd2292bbf7199d546e9cfe3fe680f8914173f9191b1c0223e68310bb1
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/ Redirect Chain
|
218 B 619 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
authen.php
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-latest.min.js
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/js/ |
94 KB 33 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.min.js
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/js/ |
8 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Acc_Carding.js
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/js/ |
1 KB 721 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chronopost.css
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
2 KB 1005 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.css
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
485 B 758 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
stylee.css
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css_1.css
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
0 269 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.1.0/css/ |
45 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chronopost_logo.png
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/img/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Acc_mask.js
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/js/ |
129 B 417 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PlutoSansDPDRegular-Web.woff
uk123gbgma.temp.swtest.ru/hadi/royalmail3/royalmail3/lib/css/ |
59 KB 58 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
use.fontawesome.com/releases/v5.1.0/webfonts/ |
58 KB 59 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Royal Mail (Government)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| $ function| jQuery object| $jscomp function| myFunction1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
uk123gbgma.temp.swtest.ru/ | Name: PHPSESSID Value: df981e6e5733847db1885a251bd1270a |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hr891.infusion-links.com
rebrand.ly
uk123gbgma.temp.swtest.ru
use.fontawesome.com
23.111.9.35
2a00:1450:4001:814::2013
3.220.113.157
77.222.61.114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