srv88816.ht-test.ru
Open in
urlscan Pro
78.110.50.127
Malicious Activity!
Public Scan
Effective URL: http://srv88816.ht-test.ru/ow/js/7tgiwh8us80x1yeg04bkzs87zt.php?a=Zy5iYWxhbGVzQG5keS5jb20=&.verify?service=nfpb=true&_pageL...
Submission: On July 22 via api from DE
Summary
This is the only time srv88816.ht-test.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 148.72.201.88 148.72.201.88 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
1 6 | 78.110.50.127 78.110.50.127 | 31240 (HT-SYSTEM...) (HT-SYSTEMS-AS Uplinks:) | |
1 2 | 103.28.49.120 103.28.49.120 | 38719 (DREAMSCAP...) (DREAMSCAPE-AS-AP Dreamscape Networks Limited) | |
6 | 2 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
up3.gamingakhada.com |
ASN31240 (HT-SYSTEMS-AS Uplinks:, RU)
srv88816.ht-test.ru |
ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU)
ndy.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ht-test.ru
1 redirects
srv88816.ht-test.ru |
1 MB |
2 |
ndy.com
1 redirects
ndy.com |
3 KB |
1 |
gamingakhada.com
1 redirects
up3.gamingakhada.com |
341 B |
1 |
sendgrid.net
1 redirects
u10084924.ct.sendgrid.net |
264 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
6 | srv88816.ht-test.ru |
1 redirects
srv88816.ht-test.ru
|
2 | ndy.com |
1 redirects
srv88816.ht-test.ru
|
1 | up3.gamingakhada.com | 1 redirects |
1 | u10084924.ct.sendgrid.net | 1 redirects |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.ndy.com Go Daddy Secure Certificate Authority - G2 |
2018-12-17 - 2020-12-17 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://srv88816.ht-test.ru/ow/js/7tgiwh8us80x1yeg04bkzs87zt.php?a=Zy5iYWxhbGVzQG5keS5jb20=&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=Zy5iYWxhbGVzQG5keS5jb20=&loginID=&.
Frame ID: 71AD1C514AE77E9A07EA4960621D2C2B
Requests: 2 HTTP requests in this frame
Frame:
http://srv88816.ht-test.ru/ow/js/ova.php?a=Zy5iYWxhbGVzQG5keS5jb20=&i=0&c=
Frame ID: 34AA6D75CA7EC71FB9238B280D4ACE84
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://u10084924.ct.sendgrid.net/ls/click?upn=SUr4b5585qbQyA5LBh0cprcX9yGxzuKRiPmK1eOyGjnFAjPT3peF3hZBU5GBT5L...
HTTP 302
http://up3.gamingakhada.com/redir.php?email=g.balales@ndy.com HTTP 302
http://srv88816.ht-test.ru/ow/js/index.php?x=x&a=g.balales@ndy.com HTTP 302
http://srv88816.ht-test.ru/ow/js/7tgiwh8us80x1yeg04bkzs87zt.php?a=Zy5iYWxhbGVzQG5keS5jb20=&.verify?serv... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Red Hat (Operating Systems) Expand
Detected patterns
- headers server /Red Hat/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u10084924.ct.sendgrid.net/ls/click?upn=SUr4b5585qbQyA5LBh0cprcX9yGxzuKRiPmK1eOyGjnFAjPT3peF3hZBU5GBT5LBWIrk6AlyASSYiViuthbVzrjDS34ovwicldeokc3mdxQ-3Dbs_6_I3JEaLZhAdq8zRbyQ80MtXCGDx2Xt4Kr1dxQBJjAnTeGbllHY-2BWBRyFM1aWS9lcIpWDjthTtyp7TD1R-2FCCKTDtmXz0ZHZ-2FT17ju5DeeziXpbilXgIWTzubrwPY9UqPKJP38pllBOMIi8qNI1sXjaUJGRWF-2F0dBDapdsrZJSDk-2FFHNcsD4IDbnWMruCJWBnQL3cGyY5nUnnErEtfybpc5rA-3D-3D
HTTP 302
http://up3.gamingakhada.com/redir.php?email=g.balales@ndy.com HTTP 302
http://srv88816.ht-test.ru/ow/js/index.php?x=x&a=g.balales@ndy.com HTTP 302
http://srv88816.ht-test.ru/ow/js/7tgiwh8us80x1yeg04bkzs87zt.php?a=Zy5iYWxhbGVzQG5keS5jb20=&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=Zy5iYWxhbGVzQG5keS5jb20=&loginID=&. Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://ndy.com/favicon.ico HTTP 302
- https://ndy.com/wp-content/cache/thumbnails/2016/05/cropped-NDY_512-1-32x32.png
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
7tgiwh8us80x1yeg04bkzs87zt.php
srv88816.ht-test.ru/ow/js/ Redirect Chain
|
921 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ova.php
srv88816.ht-test.ru/ow/js/ Frame 34AA |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.jpg
srv88816.ht-test.ru/ow/js/ico/bg/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
srv88816.ht-test.ru/ow/js/css/ Frame 34AA |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js.js
srv88816.ht-test.ru/ow/js/ico/ Frame 34AA |
6 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cropped-NDY_512-1-32x32.png
ndy.com/wp-content/cache/thumbnails/2016/05/ Frame 34AA Redirect Chain
|
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
srv88816.ht-test.ru/ | Name: PHPSESSID Value: 7s4d1444fmem7s9t7gjqksffog |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ndy.com
srv88816.ht-test.ru
u10084924.ct.sendgrid.net
up3.gamingakhada.com
103.28.49.120
148.72.201.88
167.89.123.16
78.110.50.127
1bcbd711541fce74fc4c58fce450956c507db9e1e9d83af8f13ed448e114f9a0
348885661623d29a7e835102ff9ad484158394d936269fae642bb921dcde57eb
4a0c5e29921c53dc3d9eaed7c65e3097f603ab76d96c6554cb7b3bed4b2e9f78
a6baa596c961ffab09d260ba7d7c743114ff7016e13e853b9b0f25bceac17255
eda587decd0ac055c33b13bb9f5d674d8941a56f602cb399e6019126d256d43a