nhsapplycovidpassonline.com Open in urlscan Pro
95.213.216.216  Malicious Activity! Public Scan

Submitted URL: http://nhsapplycovidpassonline.com/
Effective URL: http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Submission: On April 07 via api from IN — Scanned from DE

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 7 HTTP transactions. The main IP is 95.213.216.216, located in Russian Federation and belongs to SELECTEL, RU. The main domain is nhsapplycovidpassonline.com.
This is the only time nhsapplycovidpassonline.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: NHS UK (Healthcare)

Domain & IP information

IP Address AS Autonomous System
1 5 95.213.216.216 49505 (SELECTEL)
1 2001:4de0:ac1... 20446 (STACKPATH...)
2 96.16.146.114 16625 (AKAMAI-AS)
7 3
Apex Domain
Subdomains
Transfer
5 nhsapplycovidpassonline.com
nhsapplycovidpassonline.com
109 KB
2 assets.nhs.uk
assets.nhs.uk — Cisco Umbrella Rank: 50797
35 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 647
30 KB
7 3
Domain Requested by
5 nhsapplycovidpassonline.com 1 redirects nhsapplycovidpassonline.com
2 assets.nhs.uk nhsapplycovidpassonline.com
1 code.jquery.com nhsapplycovidpassonline.com
7 3

This site contains no links.

Subject Issuer Validity Valid
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh
www.nhs.uk
DigiCert SHA2 Secure Server CA
2021-07-16 -
2022-08-07
a year crt.sh

This page contains 1 frames:

Primary Page: http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Frame ID: 3BC54E28D9AE8F3F85FFD43463AF1A58
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

What is your name? - Book a coronavirus vaccination - NHS

Page URL History Show full URLs

  1. http://nhsapplycovidpassonline.com/ HTTP 302
    http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

7
Requests

43 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

173 kB
Transfer

229 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://nhsapplycovidpassonline.com/ HTTP 302
    http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request step1.php
nhsapplycovidpassonline.com/
Redirect Chain
  • http://nhsapplycovidpassonline.com/
  • http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
13 KB
14 KB
Document
General
Full URL
http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Protocol
HTTP/1.1
Server
95.213.216.216 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
gl.topfresh.eu
Software
Apache /
Resource Hash
26f69eb6eeee6cc66c0fe6216b76a1e809b41c893917a498ab1391022e2237a0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
close
Content-Type
text/html; charset=UTF-8
Date
Thu, 07 Apr 2022 14:41:07 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Pragma
no-cache
Server
Apache
Transfer-Encoding
chunked

Redirect headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
close
Content-Length
0
Content-Type
text/html; charset=UTF-8
Date
Thu, 07 Apr 2022 14:41:07 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Location
step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Pragma
no-cache
Server
Apache
main.css
nhsapplycovidpassonline.com/css/
77 KB
77 KB
Stylesheet
General
Full URL
http://nhsapplycovidpassonline.com/css/main.css
Requested by
Host: nhsapplycovidpassonline.com
URL: http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Protocol
HTTP/1.1
Server
95.213.216.216 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
gl.topfresh.eu
Software
Apache /
Resource Hash
16df4867f34dfc9389823b16948a458d43970afcfc35f34a0622bfb543387d2a

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 07 Apr 2022 14:41:07 GMT
Last-Modified
Wed, 30 Jun 2021 20:57:33 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
78733
Content-Type
text/css
jquery-3.6.0.min.js
code.jquery.com/
87 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: nhsapplycovidpassonline.com
URL: http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:1a , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://nhsapplycovidpassonline.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 07 Apr 2022 14:41:07 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-15d9d"
vary
Accept-Encoding
x-hw
1649342467.dop245.am5.t,1649342467.cds223.am5.hn,1649342467.cds007.am5.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30875
jquery.redirect.js
nhsapplycovidpassonline.com/js/
6 KB
6 KB
Script
General
Full URL
http://nhsapplycovidpassonline.com/js/jquery.redirect.js
Requested by
Host: nhsapplycovidpassonline.com
URL: http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Protocol
HTTP/1.1
Server
95.213.216.216 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
gl.topfresh.eu
Software
Apache /
Resource Hash
6d69ae5c4892d35573385da52afebec92fb02feaf7670b0684c1b2aa6f2cfb98

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 07 Apr 2022 14:41:07 GMT
Last-Modified
Wed, 30 Jun 2021 20:57:33 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
6354
Content-Type
application/javascript
functions.js
nhsapplycovidpassonline.com/js/
11 KB
11 KB
Script
General
Full URL
http://nhsapplycovidpassonline.com/js/functions.js?1.0.0
Requested by
Host: nhsapplycovidpassonline.com
URL: http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
Protocol
HTTP/1.1
Server
95.213.216.216 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
gl.topfresh.eu
Software
Apache /
Resource Hash
973ef58ab4a82d11e857b80ccaa4400e5630374b6ac0598932b75b3e0f844f1e

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://nhsapplycovidpassonline.com/step1.php?UcQgeEFW&inID=fSDuooyIsYezPFYxWyGFxrLfivsDZTDjJmwYZTMDVb
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 07 Apr 2022 14:41:07 GMT
Last-Modified
Wed, 30 Jun 2021 20:57:33 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
11117
Content-Type
application/javascript
FrutigerLTW01-55Roman.woff2
assets.nhs.uk/fonts/
17 KB
17 KB
Font
General
Full URL
https://assets.nhs.uk/fonts/FrutigerLTW01-55Roman.woff2
Requested by
Host: nhsapplycovidpassonline.com
URL: http://nhsapplycovidpassonline.com/css/main.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
96.16.146.114 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a96-16-146-114.deploy.static.akamaitechnologies.com
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
886f640d4cb31c0114351f25e5eeba98b79e7ae405fcc2ca50aac6ed79ff8995

Request headers

Referer
http://nhsapplycovidpassonline.com/
Origin
http://nhsapplycovidpassonline.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
date
Thu, 07 Apr 2022 14:41:07 GMT
last-modified
Tue, 09 Apr 2019 10:17:13 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
content-md5
lRIDEWIJgHewKikdW/afDg==
etag
0x8D6BCD488B0257A
content-type
application/octet-stream
access-control-allow-origin
*
x-ms-request-id
3c6ee1df-501e-0063-0247-ceee60000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=2628288
x-ms-version
2009-09-19
content-length
17284
expires
Sun, 08 May 2022 00:45:55 GMT
FrutigerLTW01-65Bold.woff2
assets.nhs.uk/fonts/
17 KB
17 KB
Font
General
Full URL
https://assets.nhs.uk/fonts/FrutigerLTW01-65Bold.woff2
Requested by
Host: nhsapplycovidpassonline.com
URL: http://nhsapplycovidpassonline.com/css/main.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
96.16.146.114 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a96-16-146-114.deploy.static.akamaitechnologies.com
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
d7a61b8131c25f4f7949162fcf342c8ba52b0257756aaacf23aa948f0403c842

Request headers

Referer
http://nhsapplycovidpassonline.com/
Origin
http://nhsapplycovidpassonline.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
date
Thu, 07 Apr 2022 14:41:07 GMT
last-modified
Tue, 09 Apr 2019 10:17:14 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
content-md5
OPdl6/MQFVFaVJuAqOKjeg==
etag
0x8D6BCD48962A5B8
content-type
application/octet-stream
access-control-allow-origin
*
x-ms-request-id
80dbecb9-701e-005d-4547-ce5841000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=2628288
x-ms-version
2009-09-19
content-length
17216
expires
Sun, 08 May 2022 00:45:55 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: NHS UK (Healthcare)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone object| oncontextlost object| oncontextrestored function| $ function| jQuery function| valid_credit_card function| clear_field function| submit function| expiry_format

1 Cookies

Domain/Path Name / Value
nhsapplycovidpassonline.com/ Name: PHPSESSID
Value: 6a9de52dd2a3bdf8c89d70b298406b10