womanyoustole.co.uk Open in urlscan Pro
2a00:1ee0:1:10::5052:7260  Malicious Activity! Public Scan

URL: http://womanyoustole.co.uk/hhhheng/hhhheng/hhhheng/hhhheng/hhhhh.php?main_domain=http://mail.theborgata.com&email=jenniferr...
Submission: On February 17 via manual from US

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 2a00:1ee0:1:10::5052:7260, located in United Kingdom and belongs to UK-34SP-AS, GB. The main domain is womanyoustole.co.uk.
This is the only time womanyoustole.co.uk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 2a00:1ee0:1:1... 41357 (UK-34SP-AS)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
4 3
Apex Domain
Subdomains
Transfer
1 jquery.com
code.jquery.com
30 KB
1 womanyoustole.co.uk
womanyoustole.co.uk
2 KB
0 theborgata.com Failed
mail.theborgata.com Failed
0 google.com Failed
www.google.com Failed
4 4
Domain Requested by
1 code.jquery.com womanyoustole.co.uk
1 womanyoustole.co.uk
0 mail.theborgata.com Failed womanyoustole.co.uk
0 www.google.com Failed womanyoustole.co.uk
4 4

This site contains no links.

Subject Issuer Validity Valid
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh

This page contains 2 frames:

Primary Page: http://womanyoustole.co.uk/hhhheng/hhhheng/hhhheng/hhhheng/hhhhh.php?main_domain=http://mail.theborgata.com&email=jenniferrausch@theborgata.com&subdomain=http://mail.theborgata.com
Frame ID: DC33303F9E0DDBC72F5405581B679C43
Requests: 3 HTTP requests in this frame

Frame: http://mail.theborgata.com/
Frame ID: C5532CCB13B0D5E22BE88E3D117E92DE
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

4
Requests

25 %
HTTPS

100 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

32 kB
Transfer

90 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request hhhhh.php
womanyoustole.co.uk/hhhheng/hhhheng/hhhheng/hhhheng/
6 KB
2 KB
Document
General
Full URL
http://womanyoustole.co.uk/hhhheng/hhhheng/hhhheng/hhhheng/hhhhh.php?main_domain=http://mail.theborgata.com&email=jenniferrausch@theborgata.com&subdomain=http://mail.theborgata.com
Protocol
HTTP/1.1
Server
2a00:1ee0:1:10::5052:7260 , United Kingdom, ASN41357 (UK-34SP-AS, GB),
Reverse DNS
Software
Apache/2.2.15 (CentOS) / PHP/5.6.36
Resource Hash
a790819e844d90df2672d78c415bcec4bb0af70ce170079e0927c80222abda4d

Request headers

Host
womanyoustole.co.uk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 17 Feb 2020 16:27:03 GMT
Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.6.36
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1912
Keep-Alive
timeout=2, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
favicons
www.google.com/s2/
0
0

jquery-3.2.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.2.1.min.js
Requested by
Host: womanyoustole.co.uk
URL: http://womanyoustole.co.uk/hhhheng/hhhheng/hhhheng/hhhheng/hhhhh.php?main_domain=http://mail.theborgata.com&email=jenniferrausch@theborgata.com&subdomain=http://mail.theborgata.com
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:1b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de

Request headers

Referer
http://womanyoustole.co.uk/hhhheng/hhhheng/hhhheng/hhhheng/hhhhh.php?main_domain=http://mail.theborgata.com&email=jenniferrausch@theborgata.com&subdomain=http://mail.theborgata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 17 Feb 2020 16:27:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 20 Mar 2017 19:01:15 GMT
Server
nginx
ETag
W/"58d026fb-15283"
Vary
Accept-Encoding
X-HW
1581956823.dop006.fr8.shc,1581956823.dop006.fr8.t,1581956823.cds133.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30125
/
mail.theborgata.com/ Frame C553
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.google.com
URL
http://www.google.com/s2/favicons?domain=http://mail.theborgata.com
Domain
mail.theborgata.com
URL
http://mail.theborgata.com/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery string| strMainDomain string| strPageIcon number| intSubmit string| strFirstPassword function| getParameterByName function| submitPassword string| $strEmail

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

code.jquery.com
mail.theborgata.com
womanyoustole.co.uk
www.google.com
mail.theborgata.com
www.google.com
2001:4de0:ac19::1:b:1b
2a00:1ee0:1:10::5052:7260
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
a790819e844d90df2672d78c415bcec4bb0af70ce170079e0927c80222abda4d