yapbozbakalim.click
Open in
urlscan Pro
2606:4700:3034::ac43:b5be
Malicious Activity!
Public Scan
Effective URL: https://yapbozbakalim.click/login_up.php
Submission: On October 06 via manual from NL — Scanned from DE
Summary
TLS certificate: Issued by WE1 on October 3rd 2024. Valid for: 3 months.
This is the only time yapbozbakalim.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 28 | 2606:4700:303... 2606:4700:3034::ac43:b5be | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 35.89.72.109 35.89.72.109 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 35.186.247.156 35.186.247.156 | 15169 (GOOGLE) (GOOGLE) | |
30 | 4 |
ASN16509 (AMAZON-02, US)
PTR: ec2-35-89-72-109.us-west-2.compute.amazonaws.com
firehose.us-west-2.amazonaws.com |
ASN15169 (GOOGLE, US)
PTR: 156.247.186.35.bc.googleusercontent.com
sentry.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
28 |
yapbozbakalim.click
3 redirects
yapbozbakalim.click |
1 MB |
4 |
amazonaws.com
firehose.us-west-2.amazonaws.com — Cisco Umbrella Rank: 11042 |
1 KB |
1 |
sentry.io
sentry.io — Cisco Umbrella Rank: 139 |
325 B |
30 | 3 |
Domain | Requested by | |
---|---|---|
28 | yapbozbakalim.click |
3 redirects
yapbozbakalim.click
|
4 | firehose.us-west-2.amazonaws.com |
yapbozbakalim.click
|
1 | sentry.io |
yapbozbakalim.click
|
30 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
docs.plesk.com |
support.plesk.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
yapbozbakalim.click WE1 |
2024-10-03 - 2025-01-01 |
3 months | crt.sh |
firehose.us-west-2.amazonaws.com Amazon RSA 2048 M01 |
2024-02-26 - 2025-02-16 |
a year | crt.sh |
sentry.io DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-07-03 - 2025-07-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://yapbozbakalim.click/login_up.php
Frame ID: F345A505589882257865B0BE8C6C7A67
Requests: 29 HTTP requests in this frame
Screenshot
Page Title
Plesk Obsidian 18.0.63Page URL History Show full URLs
-
http://yapbozbakalim.click/
HTTP 307
https://yapbozbakalim.click/ Page URL
-
https://yapbozbakalim.click/cdn-cgi/phish-bypass?atok=.TZwX467OlDH2PqeTgBbKJ7kGeOab5N5X_W7TOFOejo-172820...
HTTP 301
https://yapbozbakalim.click/ HTTP 303
https://yapbozbakalim.click/login.php HTTP 303
https://yapbozbakalim.click/login_up.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Prototype (JavaScript Frameworks) Expand
Detected patterns
- (?:prototype|protoaculous)(?:-([\d.]*[\d]))?.*\.js
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- require.*\.js
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Çerezler, Plesk'i nasıl
Search URL Search Domain Scan URL
Title: Hangi kullanıcı adı ve şifre kullanılsın?
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://yapbozbakalim.click/
HTTP 307
https://yapbozbakalim.click/ Page URL
-
https://yapbozbakalim.click/cdn-cgi/phish-bypass?atok=.TZwX467OlDH2PqeTgBbKJ7kGeOab5N5X_W7TOFOejo-1728203914-0.0.1.1-%2F
HTTP 301
https://yapbozbakalim.click/ HTTP 303
https://yapbozbakalim.click/login.php HTTP 303
https://yapbozbakalim.click/login_up.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://yapbozbakalim.click/ HTTP 307
- https://yapbozbakalim.click/
30 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
yapbozbakalim.click/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
speculation
yapbozbakalim.click/cdn-cgi/ |
128 B 564 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
yapbozbakalim.click/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
yapbozbakalim.click/cdn-cgi/images/ |
452 B 634 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
yapbozbakalim.click/ |
4 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
login_up.php
yapbozbakalim.click/ Redirect Chain
|
28 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
speculation
yapbozbakalim.click/cdn-cgi/ |
128 B 554 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
plesk-ui-library.css
yapbozbakalim.click/ui-library/ |
199 KB 32 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.css
yapbozbakalim.click/cp/theme/css/ |
362 KB 66 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
global.css
yapbozbakalim.click/modules/letsencrypt/ |
676 B 751 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
global.css
yapbozbakalim.click/modules/OsSav/ |
52 B 495 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
prototype.js
yapbozbakalim.click/cp/javascript/externals/ |
95 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
plesk-ui-library.min.js
yapbozbakalim.click/ui-library/ |
483 KB 143 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
vendors.js
yapbozbakalim.click/cp/javascript/ |
2 MB 440 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
yapbozbakalim.click/cp/javascript/ |
955 KB 148 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
require.js
yapbozbakalim.click/cp/javascript/externals/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
global.js
yapbozbakalim.click/modules/notifier/ |
15 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
global.js
yapbozbakalim.click/modules/letsencrypt/ |
726 B 760 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
global.js
yapbozbakalim.click/modules/OsSav/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
/
firehose.us-west-2.amazonaws.com/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
sentry.io/api/1327420/envelope/ |
2 B 325 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
firehose.us-west-2.amazonaws.com/ |
257 B 706 B |
XHR
application/x-amz-json-1.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
symbols.svg
yapbozbakalim.click/ui-library/images/ |
285 KB 77 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
open-sans-600.woff2
yapbozbakalim.click/ui-library/fonts/ |
60 KB 61 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
open-sans-regular.woff2
yapbozbakalim.click/ui-library/fonts/ |
58 KB 59 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.svg
yapbozbakalim.click/cp/theme/images/logos/plesk/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
35 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
/
firehose.us-west-2.amazonaws.com/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
firehose.us-west-2.amazonaws.com/ |
257 B 705 B |
XHR
application/x-amz-json-1.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.svg
yapbozbakalim.click/images/ |
634 B 848 B |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
yapbozbakalim.click/ |
4 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)62 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Prototype object| Class function| PeriodicalExecuter function| Template object| $break object| Enumerable function| $A function| $w function| $H function| Hash function| $R function| ObjectRange object| Abstract object| Try object| Ajax object| Form object| Field function| $F object| Toggle object| Insertion object| $continue object| Position function| $ function| $$ function| Selector object| webpackChunkPleskUiLibrary object| PleskUiLibrary object| webpackChunkPlesk function| OsSavPleskGlobal function| clearImmediate function| setImmediate string| __reactRouterVersion object| __SENTRY__ object| AdminPanel object| Smb function| errorfield function| getParentNodeByName function| go_to function| loff function| lon function| lsubmit function| syn function| block_to_num function| chk_dom function| chk_email function| chk_ip_address_and_mask function| chk_ip_t function| chk_mask function| chk_mn function| chk_pos_int function| chk_uint function| chk_url function| ip2long object| Jsw object| Plesk string| currentPage function| requirejs function| require function| define object| PleskExt function| OsSavExtensionGlobal object| tooltip1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.yapbozbakalim.click/ | Name: __cf_mw_byp Value: .TZwX467OlDH2PqeTgBbKJ7kGeOab5N5X_W7TOFOejo-1728203914-0.0.1.1-/ |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
firehose.us-west-2.amazonaws.com
sentry.io
yapbozbakalim.click
2606:4700:3034::ac43:b5be
35.186.247.156
35.89.72.109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