bolkem6c.beget.tech
Open in
urlscan Pro
5.101.152.148
Malicious Activity!
Public Scan
Submission: On January 27 via automatic, source openphish
Summary
This is the only time bolkem6c.beget.tech was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 5.101.152.148 5.101.152.148 | 198610 (BEGET-AS) (BEGET-AS) | |
2 | 104.111.246.106 104.111.246.106 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
11 | 2 |
ASN198610 (BEGET-AS, RU)
PTR: m2.raiden.beget.com
bolkem6c.beget.tech |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-111-246-106.deploy.static.akamaitechnologies.com
auth.gfx.ms |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
beget.tech
bolkem6c.beget.tech |
64 KB |
2 |
gfx.ms
auth.gfx.ms |
293 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
9 | bolkem6c.beget.tech |
bolkem6c.beget.tech
|
2 | auth.gfx.ms |
bolkem6c.beget.tech
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/tmailho.php?wa=wsignin1.0&rpsnv=13&ct=1506128676&rver=6.7.6643.0&wp=MBI_SSL_SHARED&wreply=https:%2F%2Fmail.live.com%2Fdefault.aspx%3Frru%3Dinbox&lc=1036&id=64855&mkt=fr-fr&cbcxt=mai&contextid=AD9BF6D88247B041&bk=1506128710&uaid=089e01e3a438445f82debdd162db02de&pid=0
Frame ID: (B8550C81871059C198325BC052F5BED4)
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
tmailho.php
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
niro.css
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.8.2.min.js
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/kola/ |
91 KB 33 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
micro.png
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
HotHead.PNG
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pers.png
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
entr.png
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jai.png
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
766 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
out.png
bolkem6c.beget.tech/BOACrsupport/cavmwedbactouch/d04f4540fa8ee07b7d78c9babf0d4902486fd27a39eaccc5471bf43773c22701be416bfc4bf1840b643291d10e3b3a50/imges/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
auth.gfx.ms/16.000.27523.1/images/Backgrounds/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.27523.1/images/Backgrounds/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
bolkem6c.beget.tech
104.111.246.106
5.101.152.148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