srv88816.ht-test.ru
Open in
urlscan Pro
78.110.50.127
Malicious Activity!
Public Scan
Effective URL: http://srv88816.ht-test.ru/ow/js/jj6vnu9dgtyfyyjoto9ak167zt.php?a=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&.verify?service=nfpb=tru...
Submission: On July 21 via manual from IN
Summary
This is the only time srv88816.ht-test.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 148.72.201.88 148.72.201.88 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
1 6 | 78.110.50.127 78.110.50.127 | 31240 (HT-SYSTEM...) (HT-SYSTEMS-AS Uplinks:) | |
1 1 | 141.118.20.217 141.118.20.217 | 852 (ASN852) (ASN852) | |
1 | 3.96.39.120 3.96.39.120 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 2 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
up3.gamingakhada.com |
ASN31240 (HT-SYSTEMS-AS Uplinks:, RU)
srv88816.ht-test.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ht-test.ru
1 redirects
srv88816.ht-test.ru |
1 MB |
2 |
atco.com
1 redirects
atco.com www.atco.com |
3 KB |
1 |
gamingakhada.com
1 redirects
up3.gamingakhada.com |
346 B |
1 |
sendgrid.net
1 redirects
u10084924.ct.sendgrid.net |
269 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
6 | srv88816.ht-test.ru |
1 redirects
srv88816.ht-test.ru
|
1 | www.atco.com |
srv88816.ht-test.ru
|
1 | atco.com | 1 redirects |
1 | up3.gamingakhada.com | 1 redirects |
1 | u10084924.ct.sendgrid.net | 1 redirects |
6 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.atco.com Entrust Certification Authority - L1K |
2020-06-26 - 2021-01-31 |
7 months | crt.sh |
This page contains 2 frames:
Primary Page:
http://srv88816.ht-test.ru/ow/js/jj6vnu9dgtyfyyjoto9ak167zt.php?a=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&loginID=&.
Frame ID: 0764F148974CD7BC5B652B57B5E4CD3E
Requests: 2 HTTP requests in this frame
Frame:
http://srv88816.ht-test.ru/ow/js/ova.php?a=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&i=0&c=
Frame ID: 378BE05CFFFE11D1E7397FD45E00EC80
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://u10084924.ct.sendgrid.net/ls/click?upn=SUr4b5585qbQyA5LBh0cprcX9yGxzuKRiPmK1eOyGjnFAjPT3peF3hZBU5GBT5L...
HTTP 302
http://up3.gamingakhada.com/redir.php?email=wayne.stensby@atco.com HTTP 302
http://srv88816.ht-test.ru/ow/js/index.php?x=x&a=wayne.stensby@atco.com HTTP 302
http://srv88816.ht-test.ru/ow/js/jj6vnu9dgtyfyyjoto9ak167zt.php?a=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&.ver... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Red Hat (Operating Systems) Expand
Detected patterns
- headers server /Red Hat/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u10084924.ct.sendgrid.net/ls/click?upn=SUr4b5585qbQyA5LBh0cprcX9yGxzuKRiPmK1eOyGjnFAjPT3peF3hZBU5GBT5LBe-2BaRUNynB1UtxqxPXXHqSFhzVR8fE6stIH1qf205uGc-3DEPhw_JA-2FyqipuwZKn5ipQY2yN7tT40KiL8CgPHvJN-2BFX6mDVS9bKirC-2BYo44n-2FkoVAS0kwEzIslqp20x7YHO8DY-2FXkg6gZjvEbMihyzgb7TapCs4q2OTCIBfMdhEp-2FFpoq-2B9pPXOkz5GO3GuP-2B85d8Fc-2FCtHSfcE6Konh05-2FdxfrHPTJWne6Gh7Rp186Mrb8Nt9lB0rLqKnU0aZKSJMx2sNr5JhAy6X7KOhuZ2MB5azsZs-2Fk-3D
HTTP 302
http://up3.gamingakhada.com/redir.php?email=wayne.stensby@atco.com HTTP 302
http://srv88816.ht-test.ru/ow/js/index.php?x=x&a=wayne.stensby@atco.com HTTP 302
http://srv88816.ht-test.ru/ow/js/jj6vnu9dgtyfyyjoto9ak167zt.php?a=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=d2F5bmUuc3RlbnNieUBhdGNvLmNvbQ==&loginID=&. Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://atco.com/favicon.ico HTTP 301
- https://www.atco.com/favicon.ico
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
jj6vnu9dgtyfyyjoto9ak167zt.php
srv88816.ht-test.ru/ow/js/ Redirect Chain
|
935 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ova.php
srv88816.ht-test.ru/ow/js/ Frame 378B |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.jpg
srv88816.ht-test.ru/ow/js/ico/bg/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
srv88816.ht-test.ru/ow/js/css/ Frame 378B |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js.js
srv88816.ht-test.ru/ow/js/ico/ Frame 378B |
6 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
www.atco.com/ Frame 378B Redirect Chain
|
7 KB 3 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
srv88816.ht-test.ru/ | Name: PHPSESSID Value: bcpvtgj33ticbi310nv8o6l70h |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
atco.com
srv88816.ht-test.ru
u10084924.ct.sendgrid.net
up3.gamingakhada.com
www.atco.com
141.118.20.217
148.72.201.88
167.89.123.16
3.96.39.120
78.110.50.127
1bcbd711541fce74fc4c58fce450956c507db9e1e9d83af8f13ed448e114f9a0
390531ea2e82942424a7634ddc007e8c342aaa3f410e910f6e99654b205f961a
64e5a804d8d518730666346ed43628b5ccfcd4a45a299a147de58f099b30981a
99ad85091d4e7f34f3cc4f79fb5ecaa1f962f07e05b3be8073b49d38a636da67
a6baa596c961ffab09d260ba7d7c743114ff7016e13e853b9b0f25bceac17255