dzaduihezf.temp.swtest.ru
Open in
urlscan Pro
77.222.40.223
Malicious Activity!
Public Scan
Effective URL: http://dzaduihezf.temp.swtest.ru/73186/infos.php
Submission: On May 06 via manual from FR — Scanned from FR
Summary
This is the only time dzaduihezf.temp.swtest.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Impots Gouv (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.28 167.89.118.28 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 173.249.35.108 173.249.35.108 | 51167 (CONTABO) (CONTABO) | |
3 15 | 77.222.40.223 77.222.40.223 | 44112 (SWEB-AS) (SWEB-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:812::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:809::2003 | 15169 (GOOGLE) (GOOGLE) | |
15 | 3 |
ASN11377 (SENDGRID, US)
PTR: o16789118x28.outbound-mail.sendgrid.net
u22247154.ct.sendgrid.net |
ASN51167 (CONTABO, DE)
PTR: orange.dnseasyhost.com
riazdoctorshospital.com |
ASN44112 (SWEB-AS, RU)
PTR: vh292.sweb.ru
dzaduihezf.temp.swtest.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
swtest.ru
3 redirects
dzaduihezf.temp.swtest.ru |
92 KB |
2 |
gstatic.com
fonts.gstatic.com |
27 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 111 |
1 KB |
1 |
riazdoctorshospital.com
1 redirects
riazdoctorshospital.com |
380 B |
1 |
sendgrid.net
1 redirects
u22247154.ct.sendgrid.net |
262 B |
15 | 5 |
Domain | Requested by | |
---|---|---|
15 | dzaduihezf.temp.swtest.ru |
3 redirects
dzaduihezf.temp.swtest.ru
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
dzaduihezf.temp.swtest.ru
|
1 | riazdoctorshospital.com | 1 redirects |
1 | u22247154.ct.sendgrid.net | 1 redirects |
15 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2022-04-11 - 2022-07-04 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-04-11 - 2022-07-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://dzaduihezf.temp.swtest.ru/73186/infos.php
Frame ID: C8A1BDF0D37189B5EC63D11EAD27BC45
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Particuliers |Page URL History Show full URLs
-
https://u22247154.ct.sendgrid.net/ls/click?upn=tyLFgt06arydP-2FR1iSEHJ7UMVVhpcgG9-2FbfWDGHtlp8jhX2FwpA-2B8atFY...
HTTP 302
https://riazdoctorshospital.com/wp-content/uploads/2022/03/ HTTP 302
http://dzaduihezf.temp.swtest.ru/index.php HTTP 302
http://dzaduihezf.temp.swtest.ru/73186 HTTP 301
http://dzaduihezf.temp.swtest.ru/73186/ HTTP 302
http://dzaduihezf.temp.swtest.ru/73186/infos.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u22247154.ct.sendgrid.net/ls/click?upn=tyLFgt06arydP-2FR1iSEHJ7UMVVhpcgG9-2FbfWDGHtlp8jhX2FwpA-2B8atFYnY-2BRdr-2BQmbJ3L6o2EfELwQEH0JLwCOorrBflxkjzfuYalqVDSM-3Di5aB_H9HwEvu65-2FuQ-2B4W4deD2vrszsZotRl3Mx3PWbvsXmMQGq8oR6T6AIvKBfA75rE2EZjM-2B5S-2FFDwK2YhUu9pHOqkQ6Hlfkr7GmvRIuJOju-2Bpuqj9umpbX-2FF5Z5di0YMt9HFBoAsIrZIW6iFfa7pZiUbnEaHxa6PafOI1nrbHNUmuneAjgF9p9sPKqlVwMH6uV5FLipxzchSZNvMIi0HK-2FZJ2LhWHqNvySdINJm8T-2F9VvY-3D
HTTP 302
https://riazdoctorshospital.com/wp-content/uploads/2022/03/ HTTP 302
http://dzaduihezf.temp.swtest.ru/index.php HTTP 302
http://dzaduihezf.temp.swtest.ru/73186 HTTP 301
http://dzaduihezf.temp.swtest.ru/73186/ HTTP 302
http://dzaduihezf.temp.swtest.ru/73186/infos.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
infos.php
dzaduihezf.temp.swtest.ru/73186/ Redirect Chain
|
23 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
dzaduihezf.temp.swtest.ru/73186/templates/styles/ |
104 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
commun.css
dzaduihezf.temp.swtest.ru/73186/templates/styles/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mire.css
dzaduihezf.temp.swtest.ru/73186/templates/styles/ |
2 KB 959 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dac.css
dzaduihezf.temp.swtest.ru/73186/templates/styles/ |
457 B 733 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
dzaduihezf.temp.swtest.ru/73186/templates/js/ |
84 KB 29 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
dzaduihezf.temp.swtest.ru/73186/templates/js/ |
33 KB 9 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.details.js
dzaduihezf.temp.swtest.ru/73186/templates/js/ |
2 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ebpe-druckheader-image
dzaduihezf.temp.swtest.ru/73186/style/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1111.css
dzaduihezf.temp.swtest.ru/73186/style/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
dzaduihezf.temp.swtest.ru/73186/templates/images/ |
53 KB 18 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
fonts.gstatic.com/s/opensans/v28/ |
16 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dgfip_dgfipicons.woff
dzaduihezf.temp.swtest.ru/73186/templates/polices/ |
7 KB 7 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4kaVIGxA.woff2
fonts.gstatic.com/s/opensans/v28/ |
10 KB 10 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Impots Gouv (Government)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone function| $ function| jQuery number| seconds function| secondPassed number| countdownTimer0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dzaduihezf.temp.swtest.ru
fonts.googleapis.com
fonts.gstatic.com
riazdoctorshospital.com
u22247154.ct.sendgrid.net
167.89.118.28
173.249.35.108
2a00:1450:4001:809::2003
2a00:1450:4001:812::200a
77.222.40.223
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
07a4d78d858bb93b3220fd4af3f599035ea5e4f932bfb53b1196ee328116c5b9
11ac42ac1f87a2758a3b75f04ded732e3c723ff7a0559659ab86d01bd4898f88
1b7742e5dae197f45167c0444b10c9f6102fd1b02c2fab707c902b7b233d9328
75b52a07e8d4d433f8dc2dd323b7661d7945611c3258161ce37772f4dda615ad
896231e8e33a7920b5a2108bbdbd68c5aa8235b1dd6579dc3de60085b6980c48
996c10534d1682283cda5058fb19a69d9773e8a719980574cc218b18ea74543a
9f2356c4b703b68db9e9248c9b41be7291c1351e8197fbb06f2d1f39984c07ea
a6e433328a5fb7458e8ecf94112095504a6e56d45d2eae26eae4f27bab5fdc4c
cce577471c2586f3e0c2518fff84a970d33f61491fb8c629341b86f238cf07c0
d402b35e6e0d996cc57dfb1f40a87b672f1eb4dfe0744da6d9c40b0d26592815
e2e544bd75b899846cf469247da8f1d3a5bbb2eff3f11203c1779f9a8c9fb3f8
eb00a60062dad3584d01aac5b8797e80dc3b53440e7c9922d302a31a0dc4a14c
f3794e9a7f229210e1dbaf831a62918c9edfc09a90a6684dcc0468f461c20e0c