hfhpcsca.tk
Open in
urlscan Pro
181.215.195.80
Malicious Activity!
Public Scan
Effective URL: http://hfhpcsca.tk/bbv/m90agw16ddjgf0ytsq5f8kb5.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&...
Submission: On July 11 via manual from ES
Summary
This is the only time hfhpcsca.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 21 | 181.215.195.80 181.215.195.80 | 197226 (SPRINT-SDC) (SPRINT-SDC) | |
1 | 104.124.133.185 104.124.133.185 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
21 | 2 |
ASN197226 (SPRINT-SDC, PL)
PTR: edc168.naismandad.com
hfhpcsca.tk |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-124-133-185.deploy.static.akamaitechnologies.com
bershka.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
hfhpcsca.tk
1 redirects
hfhpcsca.tk |
565 KB |
1 |
bershka.com
bershka.com |
480 B |
21 | 2 |
Domain | Requested by | |
---|---|---|
21 | hfhpcsca.tk |
1 redirects
hfhpcsca.tk
|
1 | bershka.com |
hfhpcsca.tk
|
21 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://hfhpcsca.tk/bbv/m90agw16ddjgf0ytsq5f8kb5.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=martavis@bershka.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 87A5F0713892153BA36DE772372F9A8C
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://hfhpcsca.tk/bbv/index.php?email=martavis@bershka.com
HTTP 302
http://hfhpcsca.tk/bbv/m90agw16ddjgf0ytsq5f8kb5.php?rand=13InboxLightaspxn.1774256418&fid.4.125... Page URL
Detected technologies
RoundCube (Web Mail) ExpandDetected patterns
- env /^(?:rcmail|rcube_|roundcube)/i
PHP (Programming Languages) Expand
Detected patterns
- url /\.php(?:$|\?)/i
- env /^(?:rcmail|rcube_|roundcube)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://hfhpcsca.tk/bbv/index.php?email=martavis@bershka.com
HTTP 302
http://hfhpcsca.tk/bbv/m90agw16ddjgf0ytsq5f8kb5.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=martavis@bershka.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
m90agw16ddjgf0ytsq5f8kb5.php
hfhpcsca.tk/bbv/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
hfhpcsca.tk/bbv/FILES/ |
46 KB 47 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.css
hfhpcsca.tk/bbv/plugins/jqueryui/themes/larry/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ui.js
hfhpcsca.tk/bbv/FILES/ |
34 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
hfhpcsca.tk/bbv/FILES/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.min.js
hfhpcsca.tk/bbv/FILES/ |
13 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.min.js
hfhpcsca.tk/bbv/FILES/ |
128 KB 129 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.min.js
hfhpcsca.tk/bbv/FILES/ |
5 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.min.js
hfhpcsca.tk/bbv/FILES/ |
231 KB 231 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
bershka.com/ |
0 480 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
linen.jpg
hfhpcsca.tk/bbv/FILES/images/ |
343 B 343 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajaxloader.gif
hfhpcsca.tk/bbv/skins/larry/images/ |
354 B 354 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttons.png
hfhpcsca.tk/bbv/skins/larry/images/ |
351 B 351 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
addcontact.png
hfhpcsca.tk/bbv/skins/larry/images/ |
354 B 354 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
filetypes.png
hfhpcsca.tk/bbv/skins/larry/images/ |
353 B 353 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
listicons.png
hfhpcsca.tk/bbv/skins/larry/images/ |
353 B 353 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
messages.png
hfhpcsca.tk/bbv/skins/larry/images/ |
352 B 352 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
quota.png
hfhpcsca.tk/bbv/skins/larry/images/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selector.png
hfhpcsca.tk/bbv/skins/larry/images/ |
352 B 352 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
splitter.png
hfhpcsca.tk/bbv/skins/larry/images/ |
352 B 352 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
watermark.jpg
hfhpcsca.tk/bbv/skins/larry/images/ |
353 B 353 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| rcube_mail_ui function| rcube_scroller function| rcube_splitter function| $ function| jQuery number| CONTROL_KEY number| SHIFT_KEY number| CONTROL_SHIFT_KEY function| roundcube_browser object| rcube_event function| rcube_event_engine function| rcube_check_email function| rcube_clone_object function| urlencode function| rcube_find_object function| rcube_mouse_is_over function| setCookie function| getCookie function| rcube_console object| bw object| Base64 function| rcube_webmail object| jstz object| rcmail function| MM_findObj function| MM_validateForm object| jQuery111001735252502681086 function| DP_jQuery_1531326400847 object| UI object| img1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
hfhpcsca.tk/ | Name: PHPSESSID Value: jlio50855c1ostvce85rgqtqe7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bershka.com
hfhpcsca.tk
104.124.133.185
181.215.195.80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