linkyahaccount.myftp.org
Open in
urlscan Pro
185.130.215.69
Malicious Activity!
Public Scan
Submission: On April 20 via api from CA
Summary
This is the only time linkyahaccount.myftp.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Yahoo (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 185.130.215.69 185.130.215.69 | 49335 (NCONNECT-AS) (NCONNECT-AS) | |
5 | 2a00:1288:7c:... 2a00:1288:7c:800::4001 | 43428 (YAHOO-ULS) (YAHOO-ULS) | |
1 2 | 104.111.214.103 104.111.214.103 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 | 2a00:1288:7c:... 2a00:1288:7c:800::4000 | 43428 (YAHOO-ULS) (YAHOO-ULS) | |
1 | 2a00:1288:110... 2a00:1288:110:c204::b000 | 34010 (YAHOO-IRD) (YAHOO-IRD) | |
1 | 87.248.114.11 87.248.114.11 | 43428 (YAHOO-ULS) (YAHOO-ULS) | |
10 | 7 |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-111-214-103.deploy.static.akamaitechnologies.com
sb.scorecardresearch.com |
ASN43428 (YAHOO-ULS, GB)
PTR: e1.ycpi.vip.lob.yahoo.com
beap-bc.yahoo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
yimg.com
s.yimg.com |
94 KB |
3 |
yahoo.com
fc.yahoo.com geo.yahoo.com beap-bc.yahoo.com |
7 KB |
2 |
scorecardresearch.com
1 redirects
sb.scorecardresearch.com |
1 KB |
1 |
myftp.org
linkyahaccount.myftp.org |
65 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
5 | s.yimg.com |
linkyahaccount.myftp.org
fc.yahoo.com s.yimg.com |
2 | sb.scorecardresearch.com |
1 redirects
linkyahaccount.myftp.org
|
1 | beap-bc.yahoo.com | |
1 | geo.yahoo.com | |
1 | fc.yahoo.com |
linkyahaccount.myftp.org
|
1 | linkyahaccount.myftp.org | |
10 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.yahoo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.yahoo.com DigiCert SHA2 High Assurance Server CA |
2019-04-11 - 2019-05-26 |
a month | crt.sh |
*.scorecardresearch.com COMODO RSA Organization Validation Secure Server CA |
2018-11-28 - 2019-12-26 |
a year | crt.sh |
*.ads.yahoo.com DigiCert SHA2 High Assurance Server CA |
2019-04-08 - 2019-05-23 |
a month | crt.sh |
This page contains 3 frames:
Primary Page:
http://linkyahaccount.myftp.org/bellsouth6467/hockmail/
Frame ID: 5A8B1BDE5AA581A492367D135785C4C4
Requests: 9 HTTP requests in this frame
Frame:
https://s.yimg.com/rq/darla/3-10-2/html/r-csc.html
Frame ID: 10C5CA0265E99F568E3DABF246C0473F
Requests: 1 HTTP requests in this frame
Frame:
https://s.yimg.com/rq/darla/3-10-2/html/r-sf.html
Frame ID: D04E44EB803F8E1EAC7775F2705E1505
Requests: 1 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 2- https://sb.scorecardresearch.com/p?c1=2&c2=7241469&c5=150002528&ns_c=UTF-8&ns__t=1508306668057&c7=https%3A%2F%2Flogin.yahoo.com%2F%3F.src%3Dfpctx%26.intl%3Dus%26.lang%3Den-US%26authMechanism%3Dprimary%26yid%3D%26eid%3D100%26add%3D1&c14=-1 HTTP 302
- https://sb.scorecardresearch.com/p2?c1=2&c2=7241469&c5=150002528&ns_c=UTF-8&ns__t=1508306668057&c7=https%3A%2F%2Flogin.yahoo.com%2F%3F.src%3Dfpctx%26.intl%3Dus%26.lang%3Den-US%26authMechanism%3Dprimary%26yid%3D%26eid%3D100%26add%3D1&c14=-1
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
linkyahaccount.myftp.org/bellsouth6467/hockmail/ |
65 KB 65 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yahoo_en-US_f_p_bestfit_2x.png
s.yimg.com/rz/d/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
650 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p2
sb.scorecardresearch.com/ Redirect Chain
|
43 B 406 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
client.php
fc.yahoo.com/sdarla/php/ |
10 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.js
s.yimg.com/rq/darla/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
g-r-min.js
s.yimg.com/rq/darla/3-10-2/js/ |
205 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
r-csc.html
s.yimg.com/rq/darla/3-10-2/html/ Frame 10C5 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
r-sf.html
s.yimg.com/rq/darla/3-10-2/html/ Frame D04E |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p
geo.yahoo.com/ |
43 B 715 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
av
beap-bc.yahoo.com/ |
43 B 512 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Yahoo (Online)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask number| pageStartTime object| I13N_config object| COUNTRY_CODES_MAP object| mbrConfig object| darlaConfig string| bucket string| currentURL string| comscoreBeaconUrl object| DARLA_CONFIG object| DARLA object| $sf undefined| $yac boolean| sf_auto_6-20-3-2019 undefined| Y object| _Y0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
beap-bc.yahoo.com
fc.yahoo.com
geo.yahoo.com
linkyahaccount.myftp.org
s.yimg.com
sb.scorecardresearch.com
104.111.214.103
185.130.215.69
2a00:1288:110:c204::b000
2a00:1288:7c:800::4000
2a00:1288:7c:800::4001
87.248.114.11
051749faa9c97c196930a37da1dd814961c7ebde35fdd13de2221ceaed351710
19b644434cfa9f5d12e1e90a3c2d062aacf27da9ecbe8393df77383ab3c00208
1a540d6790659adf104de6f73b3be7526e1729da358976fa63f366e2ca01c58d
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db
6c231f27050fdb46c5a34518cc976f45f9d559e958d7933d6c3f6bd4a7136beb
9856a8e10e1cfbbe45145181b7a292ff5b1914a0e0baea6dadee4d7c27a6b1ba
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
e54520b5891ee39e20158e35bdda8c7507b6700f19e6d111fdc1f0095754a15f