dghjk098yuiop.ddns.net Open in urlscan Pro
188.214.30.53  Malicious Activity! Public Scan

Submitted URL: http://smarturl.it/5mi4cd
Effective URL: http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125...
Submission: On January 17 via manual from CA

Summary

This website contacted 3 IPs in 4 countries across 5 domains to perform 5 HTTP transactions. The main IP is 188.214.30.53, located in Romania and belongs to THCPROJECTS, RO. The main domain is dghjk098yuiop.ddns.net.
This is the only time dghjk098yuiop.ddns.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 52.206.83.215 14618 (AMAZON-AES)
1 1 191.252.141.154 27715 (Locaweb S...)
1 4 188.214.30.53 51177 (THCPROJECTS)
1 2a00:1450:400... 15169 (GOOGLE)
1 69.89.31.230 46606 (UNIFIEDLA...)
5 3
Apex Domain
Subdomains
Transfer
4 ddns.net
dghjk098yuiop.ddns.net
20 KB
1 smallenvelop.com
smallenvelop.com
1 googleapis.com
ajax.googleapis.com
30 KB
1 duckdns.org
dollly.admlln.duckdns.org
257 B
1 smarturl.it
smarturl.it
796 B
5 5
Domain Requested by
4 dghjk098yuiop.ddns.net 1 redirects dghjk098yuiop.ddns.net
1 smallenvelop.com dghjk098yuiop.ddns.net
1 ajax.googleapis.com dghjk098yuiop.ddns.net
1 dollly.admlln.duckdns.org 1 redirects
1 smarturl.it 1 redirects
5 5

This site contains no links.

Subject Issuer Validity Valid
*.storage.googleapis.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
smallenvelop.com
Let's Encrypt Authority X3
2019-12-24 -
2020-03-23
3 months crt.sh

This page contains 1 frames:

Primary Page: http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Frame ID: 39E615688E93248F4628F3B1546C9605
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://smarturl.it/5mi4cd HTTP 301
    http://dollly.admlln.duckdns.org/ HTTP 302
    http://dghjk098yuiop.ddns.net/weds/OWA/index.php HTTP 302
    http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspx... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

5
Requests

40 %
HTTPS

20 %
IPv6

5
Domains

5
Subdomains

3
IPs

4
Countries

49 kB
Transfer

104 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://smarturl.it/5mi4cd HTTP 301
    http://dollly.admlln.duckdns.org/ HTTP 302
    http://dghjk098yuiop.ddns.net/weds/OWA/index.php HTTP 302
    http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
dghjk098yuiop.ddns.net/weds/OWA/
Redirect Chain
  • http://smarturl.it/5mi4cd?
  • http://dollly.admlln.duckdns.org/
  • http://dghjk098yuiop.ddns.net/weds/OWA/index.php
  • http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
3 KB
2 KB
Document
General
Full URL
http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
HTTP/1.1
Server
188.214.30.53 , Romania, ASN51177 (THCPROJECTS, RO),
Reverse DNS
bf1-xterm.burymerely.com
Software
LiteSpeed /
Resource Hash
077380c7fa193e1461cff9e8791c1dec7d6753417ce52fb8c67bdf88a4e0def0

Request headers

Host
dghjk098yuiop.ddns.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Content-Length
1407
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Fri, 17 Jan 2020 04:33:56 GMT
Server
LiteSpeed

Redirect headers

Connection
Keep-Alive
Location
login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Content-Type
text/html; charset=UTF-8
Content-Length
0
Date
Fri, 17 Jan 2020 04:33:55 GMT
Server
LiteSpeed
Cache-Control
no-cache, no-store, must-revalidate, max-age=0
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/
84 KB
30 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Requested by
Host: dghjk098yuiop.ddns.net
URL: http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 15 Jan 2020 01:09:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
185076
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
30028
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 14 Jan 2021 01:09:20 GMT
w1.png
dghjk098yuiop.ddns.net/weds/OWA/images/
15 KB
16 KB
Image
General
Full URL
http://dghjk098yuiop.ddns.net/weds/OWA/images/w1.png
Requested by
Host: dghjk098yuiop.ddns.net
URL: http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
HTTP/1.1
Server
188.214.30.53 , Romania, ASN51177 (THCPROJECTS, RO),
Reverse DNS
bf1-xterm.burymerely.com
Software
LiteSpeed /
Resource Hash
b35a23cbf7cc710b51de27c5228d5091935af60b8c266283af789c6f88f6a9ad

Request headers

Referer
http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Fri, 17 Jan 2020 04:33:56 GMT
Last-Modified
Fri, 12 Apr 2019 01:28:00 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
15746
Expires
Fri, 24 Jan 2020 04:33:56 GMT
gn.png
dghjk098yuiop.ddns.net/weds/OWA/images/
2 KB
2 KB
Image
General
Full URL
http://dghjk098yuiop.ddns.net/weds/OWA/images/gn.png
Requested by
Host: dghjk098yuiop.ddns.net
URL: http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
HTTP/1.1
Server
188.214.30.53 , Romania, ASN51177 (THCPROJECTS, RO),
Reverse DNS
bf1-xterm.burymerely.com
Software
LiteSpeed /
Resource Hash
fd3cbf1b00cfc185429ac7898d3093019a8ffaf349c78fe934d15462afcdc6aa

Request headers

Referer
http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Fri, 17 Jan 2020 04:33:56 GMT
Last-Modified
Fri, 12 Apr 2019 01:06:04 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1810
Expires
Fri, 24 Jan 2020 04:33:56 GMT
Preloader_11.gif
smallenvelop.com/wp-content/uploads/2014/08/
0
0
Image
General
Full URL
https://smallenvelop.com/wp-content/uploads/2014/08/Preloader_11.gif
Requested by
Host: dghjk098yuiop.ddns.net
URL: http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
69.89.31.230 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box430.bluehost.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://dghjk098yuiop.ddns.net/weds/OWA/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-email&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery

0 Cookies