valdmail-account.duckdns.org Open in urlscan Pro
205.185.119.181  Malicious Activity! Public Scan

Submitted URL: https://protect2.fireeye.com/v1/url?k=586b242b-05123134-586bba31-000babff1381-aa2286b6af76eff3&q=1&e=f41a0dfe-6578-4380-a309-...
Effective URL: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949...
Submission: On March 01 via manual from SA

Summary

This website contacted 1 IPs in 2 countries across 3 domains to perform 6 HTTP transactions. The main IP is 205.185.119.181, located in San Jose, United States and belongs to PONYNET, US. The main domain is valdmail-account.duckdns.org.
TLS certificate: Issued by cPanel, Inc. Certification Authority on February 26th 2020. Valid for: 3 months.
This is the only time valdmail-account.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 2a02:e980:d::a0 19551 (INCAPSULA)
1 1 49.212.207.107 9371 (SAKURA-C ...)
1 7 205.185.119.181 53667 (PONYNET)
6 1
Apex Domain
Subdomains
Transfer
7 duckdns.org
valdmail-account.duckdns.org
285 KB
1 uedajapan.com
uedajapan.com
349 B
1 fireeye.com
protect2.fireeye.com
737 B
6 3
Domain Requested by
7 valdmail-account.duckdns.org 1 redirects valdmail-account.duckdns.org
1 uedajapan.com 1 redirects
1 protect2.fireeye.com 1 redirects
6 3

This site contains no links.

Subject Issuer Validity Valid
valdmail-account.duckdns.org
cPanel, Inc. Certification Authority
2020-02-26 -
2020-05-26
3 months crt.sh

This page contains 1 frames:

Primary Page: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Frame ID: DE81DED05593D80A45DA047BE767FC93
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://protect2.fireeye.com/v1/url?k=586b242b-05123134-586bba31-000babff1381-aa2286b6af76eff3&q=1&e=f41a... HTTP 302
    http://uedajapan.com/wp-includes/css/dist/nux/?email=asherwani@alfransi.com.sa HTTP 302
    https://valdmail-account.duckdns.org/gener/domainmail/Edited/?email=asherwani@alfransi.com.sa HTTP 302
    https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id84783883774882... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
  • script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

6
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

1
IPs

2
Countries

284 kB
Transfer

283 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://protect2.fireeye.com/v1/url?k=586b242b-05123134-586bba31-000babff1381-aa2286b6af76eff3&q=1&e=f41a0dfe-6578-4380-a309-a21ec0c76d90&u=http%3A%2F%2Fuedajapan.com%2Fwp-includes%2Fcss%2Fdist%2Fnux%2F%3Femail%3Dasherwani%40alfransi.com.sa HTTP 302
    http://uedajapan.com/wp-includes/css/dist/nux/?email=asherwani@alfransi.com.sa HTTP 302
    https://valdmail-account.duckdns.org/gener/domainmail/Edited/?email=asherwani@alfransi.com.sa HTTP 302
    https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.php
valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/
Redirect Chain
  • https://protect2.fireeye.com/v1/url?k=586b242b-05123134-586bba31-000babff1381-aa2286b6af76eff3&q=1&e=f41a0dfe-6578-4380-a309-a21ec0c76d90&u=http%3A%2F%2Fuedajapan.com%2Fwp-includes%2Fcss%2Fdist%2Fn...
  • http://uedajapan.com/wp-includes/css/dist/nux/?email=asherwani@alfransi.com.sa
  • https://valdmail-account.duckdns.org/gener/domainmail/Edited/?email=asherwani@alfransi.com.sa
  • https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.ph...
5 KB
5 KB
Document
General
Full URL
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.119.181 San Jose, United States, ASN53667 (PONYNET, US),
Reverse DNS
ongo.123rochost.xyz
Software
Apache /
Resource Hash
75fe6957efce7ff4beb893320cdb970cecf990bdb8d31e0f7064c2b939d3ae51

Request headers

Host
valdmail-account.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Sun, 01 Mar 2020 14:08:41 GMT
Server
Apache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Sun, 01 Mar 2020 14:08:41 GMT
Server
Apache
Location
mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
bootstrap.min.css
valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/vendor/bootstrap...
138 KB
138 KB
Stylesheet
General
Full URL
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/vendor/bootstrap/css/bootstrap.min.css
Requested by
Host: valdmail-account.duckdns.org
URL: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.119.181 San Jose, United States, ASN53667 (PONYNET, US),
Reverse DNS
ongo.123rochost.xyz
Software
Apache /
Resource Hash
7928b5ab63c6e89ee0ee26f5ef201a58c72baf91abb688580a1aa26eb57b3c11

Request headers

Referer
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Sun, 01 Mar 2020 14:08:41 GMT
Last-Modified
Thu, 08 Nov 2018 06:44:30 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
140936
google.png
valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/
4 KB
4 KB
Image
General
Full URL
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/google.png
Requested by
Host: valdmail-account.duckdns.org
URL: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.119.181 San Jose, United States, ASN53667 (PONYNET, US),
Reverse DNS
ongo.123rochost.xyz
Software
Apache /
Resource Hash
fd4d9d732e7a4af52746ebabe6bb16941ee71ae3e919131af700cf4e1228a16a

Request headers

Referer
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Sun, 01 Mar 2020 14:08:42 GMT
Last-Modified
Sat, 09 Nov 2019 19:02:22 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3831
jquery-2.2.3.min.js
valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/vendor/jquery/
84 KB
84 KB
Script
General
Full URL
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/vendor/jquery/jquery-2.2.3.min.js
Requested by
Host: valdmail-account.duckdns.org
URL: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.119.181 San Jose, United States, ASN53667 (PONYNET, US),
Reverse DNS
ongo.123rochost.xyz
Software
Apache /
Resource Hash
6b6de0d4db7876d1183a3edb47ebd3bbbf93f153f5de1ba6645049348628109a

Request headers

Referer
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Sun, 01 Mar 2020 14:08:42 GMT
Last-Modified
Wed, 23 Jan 2019 10:00:18 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
85659
bootstrap.min.js
valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/vendor/bootstrap...
50 KB
50 KB
Script
General
Full URL
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/vendor/bootstrap/js/bootstrap.min.js
Requested by
Host: valdmail-account.duckdns.org
URL: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.119.181 San Jose, United States, ASN53667 (PONYNET, US),
Reverse DNS
ongo.123rochost.xyz
Software
Apache /
Resource Hash
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4

Request headers

Referer
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Sun, 01 Mar 2020 14:08:42 GMT
Last-Modified
Thu, 08 Nov 2018 06:44:30 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
51039
data.js
valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/js/
3 KB
3 KB
Script
General
Full URL
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/js/data.js
Requested by
Host: valdmail-account.duckdns.org
URL: https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.119.181 San Jose, United States, ASN53667 (PONYNET, US),
Reverse DNS
ongo.123rochost.xyz
Software
Apache /
Resource Hash
8cd640ce0f5030fe64b1f27e5fcc3e1b5b43cfd6d7f14b408ddb119ae1724250

Request headers

Referer
https://valdmail-account.duckdns.org/gener/domainmail/Edited/mail.login.com/email-authentication-id8478388377488299287474729299942949947927449589398/user-session/Auth0F38575889948399385943/index.php?auth5774897567yhdZxWq2178Jdh90488309k=1&email=asherwani@alfransi.com.sa&auth0=true&session-id=095995793997499339944939394384738
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Sun, 01 Mar 2020 14:08:42 GMT
Last-Modified
Sat, 14 Dec 2019 04:06:50 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3179

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery object| bootstrap number| counter object| email object| password object| showDomain string| domain function| checkMail

0 Cookies