nethost-1911.inet.vn
Open in
urlscan Pro
103.57.222.17
Malicious Activity!
Public Scan
Effective URL: http://nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/z0n51/cc.php?update
Submission Tags: @phish_report
Submission: On March 18 via api from FI — Scanned from FI
Summary
This is the only time nethost-1911.inet.vn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Swiss Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 103.57.222.17 103.57.222.17 | 135905 (VNPT-AS-V...) (VNPT-AS-VN VIETNAM POSTS AND TELECOMMUNICATIONS GROUP) | |
13 | 1 |
ASN135905 (VNPT-AS-VN VIETNAM POSTS AND TELECOMMUNICATIONS GROUP, VN)
PTR: nethost-1911.inet.vn
nethost-1911.inet.vn |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
inet.vn
nethost-1911.inet.vn |
635 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | nethost-1911.inet.vn |
nethost-1911.inet.vn
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/z0n51/cc.php?update
Frame ID: 1FD6F383BE26B546364C26A97E356969
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Schweizer PostDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
cc.php
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/z0n51/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/css/ |
152 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
helpers.css
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/css/ |
41 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/css/ |
4 KB 803 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img2.jpg
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/images/ |
151 KB 152 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/images/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/js/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/js/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/js/ |
133 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome.min.js
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/js/ |
1 MB 376 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/js/ |
18 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
nethost-1911.inet.vn/~uhwiqhoihosting/apps/ch-post-command/SW/help/assets/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Swiss Post (Transportation)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Popper object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome boolean| isShift string| seperator string| dash function| cc_date function| date_of_birth1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nethost-1911.inet.vn/ | Name: PHPSESSID Value: aaba25ef4da7c21485b330b2364d2ea2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nethost-1911.inet.vn
103.57.222.17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