mail-mod-gov-bd.herokuapp.com
Open in
urlscan Pro
3.227.117.91
Malicious Activity!
Public Scan
Submission: On January 05 via manual from US
Summary
This is the only time mail-mod-gov-bd.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 3.227.117.91 3.227.117.91 | 14618 (AMAZON-AES) (AMAZON-AES) | |
5 | 1 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-227-117-91.compute-1.amazonaws.com
mail-mod-gov-bd.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
herokuapp.com
mail-mod-gov-bd.herokuapp.com |
92 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | mail-mod-gov-bd.herokuapp.com |
mail-mod-gov-bd.herokuapp.com
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://mail-mod-gov-bd.herokuapp.com/
Frame ID: 8B498BD7FBD1BBFC702701F54E8EA946
Requests: 2 HTTP requests in this frame
Frame:
http://mail-mod-gov-bd.herokuapp.com/mail.php?username=
Frame ID: 5E0412A1EA3D4D3B00B1990A067465B5
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
mail-mod-gov-bd.herokuapp.com/ |
807 B 999 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.svg
mail-mod-gov-bd.herokuapp.com/error_files/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.php
mail-mod-gov-bd.herokuapp.com/ Frame 5E04 |
84 KB 84 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
webmail_urs_mail126.css
mail-mod-gov-bd.herokuapp.com/error_files/ Frame 5E04 |
105 B 356 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tt.png
mail-mod-gov-bd.herokuapp.com/error_files/ Frame 5E04 |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail-mod-gov-bd.herokuapp.com
3.227.117.91
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
1a77519214353b1dec86dde901b374410851e3e96217923dd5dab349afb5afc8
6881d1e8725baa82916cb67934c91bd1e3483b31498507f7376f531b54559df0
7eb71a7b37d7ecec6ff7519ccddb109319859035a74a1604b4135b2833d30326
fe9579c5fd69f43249288e22e880bce555815e3fcede42ab4d5a2a4f81229f28