swzcnm.igg.biz
Open in
urlscan Pro
93.157.63.185
Malicious Activity!
Public Scan
Effective URL: https://swzcnm.igg.biz/awsezs42ew=/aszw3/4vqhjaf5ax78nfdirrlm8uc3.php?rand=13InboxLightaspxn.1774256418&fid.4.125289964...
Submission: On October 25 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 13th 2018. Valid for: 3 months.
This is the only time swzcnm.igg.biz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:10:... 2606:4700:10::6814:da2a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 5.189.152.42 5.189.152.42 | 51167 (CONTABO) (CONTABO) | |
1 16 | 93.157.63.185 93.157.63.185 | 43350 (NFORCE) (NFORCE) | |
16 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
tinyurl.com |
ASN43350 (NFORCE, NL)
PTR: server.dnsfreedom.net
swzcnm.igg.biz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
igg.biz
2 redirects
98765seew.igg.biz swzcnm.igg.biz |
91 KB |
1 |
tinyurl.com
1 redirects
tinyurl.com |
414 B |
0 |
fake.com
Failed
fake.com Failed |
|
16 | 3 |
Domain | Requested by | |
---|---|---|
16 | swzcnm.igg.biz |
1 redirects
swzcnm.igg.biz
|
1 | 98765seew.igg.biz | 1 redirects |
1 | tinyurl.com | 1 redirects |
0 | fake.com Failed |
swzcnm.igg.biz
|
16 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
fesdx.swzcnm.igg.biz Let's Encrypt Authority X3 |
2018-10-13 - 2019-01-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://swzcnm.igg.biz/awsezs42ew=/aszw3/4vqhjaf5ax78nfdirrlm8uc3.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 55F5E0DA81A7F0863CEAA7319BFC7307
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://tinyurl.com/yapxjzkv/?login=fake@fake.com
HTTP 301
http://98765seew.igg.biz/zsaw23/?login=fake@fake.com HTTP 302
https://swzcnm.igg.biz/awsezs42ew=/aszw3/?email=fake@fake.com HTTP 302
https://swzcnm.igg.biz/awsezs42ew=/aszw3/4vqhjaf5ax78nfdirrlm8uc3.php?rand=13InboxLightaspxn.177425... Page URL
Detected technologies
RoundCube (Web Mail) ExpandDetected patterns
- env /^(?:rcmail|rcube_|roundcube)/i
PHP (Programming Languages) Expand
Detected patterns
- env /^(?:rcmail|rcube_|roundcube)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://tinyurl.com/yapxjzkv/?login=fake@fake.com
HTTP 301
http://98765seew.igg.biz/zsaw23/?login=fake@fake.com HTTP 302
https://swzcnm.igg.biz/awsezs42ew=/aszw3/?email=fake@fake.com HTTP 302
https://swzcnm.igg.biz/awsezs42ew=/aszw3/4vqhjaf5ax78nfdirrlm8uc3.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=fake@fake.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
4vqhjaf5ax78nfdirrlm8uc3.php
swzcnm.igg.biz/awsezs42ew=/aszw3/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
46 KB 47 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.htm
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ui.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
34 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
fake.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.js
swzcnm.igg.biz/awsezs42ew=/aszw3/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
linen.jpg
swzcnm.igg.biz/awsezs42ew=/aszw3/files/images/ |
357 B 357 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fake.com
- URL
- http://fake.com/favicon.ico
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| rcube_mail_ui function| rcube_scroller function| rcube_splitter undefined| rcmail function| MM_findObj function| MM_validateForm undefined| UI1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
swzcnm.igg.biz/ | Name: PHPSESSID Value: p57ijf253ioqmopnpjka8372d5 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
98765seew.igg.biz
fake.com
swzcnm.igg.biz
tinyurl.com
fake.com
2606:4700:10::6814:da2a
5.189.152.42
93.157.63.185
1290877138c5b5f3fa25ba66dd76de246480ff1ced8cdc5a196d9ec20bb399d7
4a88f76fce5774d10e3e16a49afae7547fa3826b57c4309553a2044cabbd32f9
c21819444c59933ada030bc71b93325df463d5644fd75181f8bbd5c69c07912a
e4048613475c00b1a77c90d3f7a8f9c0986cc710eff9ad990db9701d2e9995c4