koreacorp.duckdns.org Open in urlscan Pro
18.188.65.80  Malicious Activity! Public Scan

URL: http://koreacorp.duckdns.org/note/kr/kr/o.php
Submission: On April 23 via api from CA

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 18.188.65.80, located in Columbus, United States and belongs to AMAZON-02, US. The main domain is koreacorp.duckdns.org.
This is the only time koreacorp.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
2 18.188.65.80 16509 (AMAZON-02)
1 192.0.72.23 2635 (AUTOMATTIC)
3 2
Apex Domain
Subdomains
Transfer
2 duckdns.org
koreacorp.duckdns.org
2 KB
1 wordpress.com
yahnwagner.files.wordpress.com
95 KB
3 2
Domain Requested by
2 koreacorp.duckdns.org koreacorp.duckdns.org
1 yahnwagner.files.wordpress.com koreacorp.duckdns.org
3 2

This site contains no links.

Subject Issuer Validity Valid
*.files.wordpress.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-15 -
2021-01-14
2 years crt.sh

This page contains 1 frames:

Primary Page: http://koreacorp.duckdns.org/note/kr/kr/o.php
Frame ID: 4D39D6A931FC45B9266ABA31A2EA990A
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

33 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

97 kB
Transfer

96 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request o.php
koreacorp.duckdns.org/note/kr/kr/
2 KB
2 KB
Document
General
Full URL
http://koreacorp.duckdns.org/note/kr/kr/o.php
Protocol
HTTP/1.1
Server
18.188.65.80 Columbus, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-188-65-80.us-east-2.compute.amazonaws.com
Software
Apache /
Resource Hash
a463f622517f58b491c9a03655e065d7bdfa01e71e4b0ea558ba9e0639ed8b53

Request headers

Host
koreacorp.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 23 Apr 2020 04:34:27 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
google_analytics_auto.js
koreacorp.duckdns.org/
0
0
Script
General
Full URL
http://koreacorp.duckdns.org/google_analytics_auto.js
Requested by
Host: koreacorp.duckdns.org
URL: http://koreacorp.duckdns.org/note/kr/kr/o.php
Protocol
HTTP/1.1
Server
18.188.65.80 Columbus, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-188-65-80.us-east-2.compute.amazonaws.com
Software
Apache /
Resource Hash

Request headers

Referer
http://koreacorp.duckdns.org/note/kr/kr/o.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 23 Apr 2020 04:34:27 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
315
Content-Type
text/html; charset=iso-8859-1
logoemail.png
yahnwagner.files.wordpress.com/2015/05/
94 KB
95 KB
Image
General
Full URL
https://yahnwagner.files.wordpress.com/2015/05/logoemail.png
Requested by
Host: koreacorp.duckdns.org
URL: http://koreacorp.duckdns.org/note/kr/kr/o.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.23 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
4b89616e2a678635916096d9c0995d01703c202e96b6a5efdaf793d05fcb7238

Request headers

Referer
http://koreacorp.duckdns.org/note/kr/kr/o.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT ams 23 np
date
Thu, 23 Apr 2020 04:34:27 GMT
last-modified
Mon, 08 Jun 2015 01:57:39 GMT
server
nginx
x-orig-src
01_mogdir
content-type
image/png
status
200
accept-ranges
bytes
content-length
96547
expires
Thu, 07 May 2020 13:44:07 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

koreacorp.duckdns.org
yahnwagner.files.wordpress.com
18.188.65.80
192.0.72.23
4b89616e2a678635916096d9c0995d01703c202e96b6a5efdaf793d05fcb7238
a463f622517f58b491c9a03655e065d7bdfa01e71e4b0ea558ba9e0639ed8b53