he38.strangled.net
Open in
urlscan Pro
140.99.170.166
Malicious Activity!
Public Scan
Submission: On May 02 via manual from JP — Scanned from JP
Summary
This is the only time he38.strangled.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: au ID (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 140.99.170.166 140.99.170.166 | 35913 (DEDIPATH-LLC) (DEDIPATH-LLC) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
strangled.net
he38.strangled.net |
91 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | he38.strangled.net |
he38.strangled.net
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://he38.strangled.net/
Frame ID: 75271CB5FDAE81D5E1CBE06B09682F7B
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
he38.strangled.net/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new1.css
he38.strangled.net/static/au_order/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new2.css
he38.strangled.net/static/au_order/ |
868 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.min.js
he38.strangled.net/static/hau/ |
90 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.cookie.js
he38.strangled.net/static/hau/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
he38.strangled.net/static/au_order/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vcard.jpeg
he38.strangled.net/static/au_order/ |
32 KB 32 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fig_cc-01.png
he38.strangled.net/static/au_order/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_seven.png
he38.strangled.net/static/au_order/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_lawson.png
he38.strangled.net/static/au_order/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_ministop.png
he38.strangled.net/static/au_order/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_seicomart.png
he38.strangled.net/static/au_order/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: au ID (Telecommunication)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery object| myDate number| year number| month number| day function| reg1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
he38.strangled.net/ | Name: sessionid Value: cda887a9e090590332673b1e72ef62b5 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
he38.strangled.net
140.99.170.166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