www.toyotagdl-com-mx.grupooz.com
Open in
urlscan Pro
69.89.31.228
Malicious Activity!
Public Scan
Effective URL: http://www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/dv4h1hmp7tpdbd73br89kbhl.php?rand=13InboxLightaspxn.1774256418&fid.4.125289...
Submission: On June 27 via manual from US
Summary
This is the only time www.toyotagdl-com-mx.grupooz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Maersk (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 10 | 69.89.31.228 69.89.31.228 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
8 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: box428.bluehost.com
www.toyotagdl-com-mx.grupooz.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
grupooz.com
2 redirects
www.toyotagdl-com-mx.grupooz.com |
1 MB |
8 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.toyotagdl-com-mx.grupooz.com |
2 redirects
www.toyotagdl-com-mx.grupooz.com
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/dv4h1hmp7tpdbd73br89kbhl.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=phish@aol.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 690E3836AF0F4D411D725219959A9C2C
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25%24%5E%26*%23%40!%24?email=phish@aol.com
HTTP 301
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/?email=phish@aol.com HTTP 302
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/dv4h1hmp7tpdbd73br89kbhl.php?rand=13InboxLightaspxn.177... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25%24%5E%26*%23%40!%24?email=phish@aol.com
HTTP 301
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/?email=phish@aol.com HTTP 302
http://www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/dv4h1hmp7tpdbd73br89kbhl.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=phish@aol.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
dv4h1hmp7tpdbd73br89kbhl.php
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/ Redirect Chain
|
62 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b6.jpg
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/images/ |
594 KB 591 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b5.jpg
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/images/ |
139 KB 139 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b4.jpg
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/images/ |
72 KB 72 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b3.jpg
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/images/ |
257 KB 256 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b2.jpg
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/images/ |
115 KB 108 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b1.jpg
www.toyotagdl-com-mx.grupooz.com/.sys/%25$%5e&*%23@!$/images/ |
90 KB 83 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pattern.png
www.toyotagdl-com-mx.grupooz.com/.sys/images/ |
422 B 422 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Maersk (Transportation)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.toyotagdl-com-mx.grupooz.com/ | Name: PHPSESSID Value: hkotrg9j8jlr3tij65t7rkvb52 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.toyotagdl-com-mx.grupooz.com
69.89.31.228
05112f50ed02422cec8883a32326e8975cea42861c22e5fe2e0fcb0f0211e54f
31db972937750fdc2de5d288894d50882876c031f05ee5eafb1a41c5775f35a5
8a46f0f573f565185557acf1eba4702ae240985c66ff1677157b585a294fb4e2
8dd24b0e252e29659937ef498d79864b0c28a8ab03e5db97dcff92714d4fe951
8fda4e79f6b98ab1890a54902431fb1fbcdaa5599262b17f0a12534f24e4187b
915ee5d5e27e36936d1f761ad6312b6919dd0018a7244f3ac613c5e705f9f0cd
c218b7ecbb07cd35d33264c28f914e6dbef00636d2b27816e3e8109056f84f0e
c9afca0cd6a234e984e49f7e63871a20de461b9c320f30e140cfbe8c7dea1b7a