wm.mailanyone.net
Open in
urlscan Pro
208.70.129.161
Malicious Activity!
Public Scan
Effective URL: https://wm.mailanyone.net/login/login.php
Submission: On June 03 via manual from US
Summary
TLS certificate: Issued by GoGetSSL RSA DV CA on December 27th 2019. Valid for: 2 years.
This is the only time wm.mailanyone.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 208.70.129.160 208.70.129.160 | 16941 (CENTURYLI...) (CENTURYLINK-LEGACY-FUSEPOINT-CTS-CANADA-POP) | |
5 | 208.70.129.161 208.70.129.161 | 16941 (CENTURYLI...) (CENTURYLINK-LEGACY-FUSEPOINT-CTS-CANADA-POP) | |
5 | 1 |
ASN16941 (CENTURYLINK-LEGACY-FUSEPOINT-CTS-CANADA-POP, US)
PTR: www.mailanyone.net
mailanyone.net |
ASN16941 (CENTURYLINK-LEGACY-FUSEPOINT-CTS-CANADA-POP, US)
PTR: wm-origin.mailanyone.net
wm.mailanyone.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
mailanyone.net
1 redirects
mailanyone.net wm.mailanyone.net |
15 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | wm.mailanyone.net |
wm.mailanyone.net
|
1 | mailanyone.net | 1 redirects |
5 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
support.threattracksecurity.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mailanyone.net GoGetSSL RSA DV CA |
2019-12-27 - 2022-03-30 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://wm.mailanyone.net/login/login.php
Frame ID: 3FE1C57F02DEF1BD6F3451E94BD9E2D9
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://mailanyone.net/
HTTP 302
https://wm.mailanyone.net/login/login.php Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: the Release Notes for details
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mailanyone.net/
HTTP 302
https://wm.mailanyone.net/login/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
wm.mailanyone.net/login/ Redirect Chain
|
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
wm.mailanyone.net/login/css/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
wm.mailanyone.net/login/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
box_bg.png
wm.mailanyone.net/login/images/ |
944 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
button_bg.png
wm.mailanyone.net/login/images/ |
944 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)50 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated string| agt number| is_major number| is_minor boolean| is_safari boolean| is_nav boolean| is_nav2 boolean| is_nav3 boolean| is_nav4 boolean| is_nav4up boolean| is_navonly boolean| is_nav6 boolean| is_nav6up boolean| is_gecko boolean| is_ie boolean| is_ie3 boolean| is_ie4 boolean| is_ie4up boolean| is_ie5 boolean| is_ie5_5 boolean| is_ie5up boolean| is_ie5_5up boolean| is_ie6 boolean| is_ie6up boolean| is_opera boolean| is_mac boolean| is_iemac function| changeSSL function| validateUserPassword function| doSubmit function| createHiddenField function| changeVersion function| switchOldNewVersion function| Get_Cookie function| Set_Cookie function| Delete_Cookie function| loadLogin string| current number| changessl number| changeversion1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
wm.mailanyone.net/ | Name: PHPSESSID Value: 14203cae66s73tdml1npo2eag6 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mailanyone.net
wm.mailanyone.net
208.70.129.160
208.70.129.161
0fe73f262949271e946a2edb72c418c79f309919e613ce7621ef86824e8fe404
5216fb3953bed0543f9a0a3a303f292a3f4728a216bb1dadd2047d3a960b0566
b5dfb6bda05b9c9c1ad6f161de325099997eec8e26d3d3b3398b432dda2ccc23
b8ff62a793d198f1e44ccdc52cfdbf79a788ad207c1afae9ceb45f59ca866883
e40ef5e242ea8bcdfac4c7f6c49d6add4d4992053f377218dd72d1f435133a75