videsignz.com
Open in
urlscan Pro
67.195.61.46
Malicious Activity!
Public Scan
Submission: On May 02 via api from CA
Summary
This is the only time videsignz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Alibaba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 67.195.61.46 67.195.61.46 | 36647 (YAHOO-GQ1) (YAHOO-GQ1 - Yahoo) | |
3 | 52.22.239.19 52.22.239.19 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
7 | 2 |
ASN36647 (YAHOO-GQ1 - Yahoo, US)
PTR: p10pn-i.geo.vip.gq1.yahoo.com
videsignz.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-22-239-19.compute-1.amazonaws.com
np.lexity.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
videsignz.com
videsignz.com |
392 KB |
3 |
lexity.com
np.lexity.com |
4 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
4 | videsignz.com |
videsignz.com
|
3 | np.lexity.com |
videsignz.com
np.lexity.com |
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://videsignz.com/sandbox/uploader/js/alibaba/alibaba/index.php
Frame ID: CE6929C71782D2F17F91E058CF1BF2DF
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache Traffic Server (Web Servers) Expand
Detected patterns
- headers server /ATS\/?([\d.]+)?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
index.php
videsignz.com/sandbox/uploader/js/alibaba/alibaba/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img2.png
videsignz.com/sandbox/uploader/js/alibaba/alibaba/images/ |
327 KB 328 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img1.jpg
videsignz.com/sandbox/uploader/js/alibaba/alibaba/images/ |
54 KB 55 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img3.gif
videsignz.com/sandbox/uploader/js/alibaba/alibaba/images/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d1b8f31ef3a187b46ca5f5e0bd65e43a
np.lexity.com/embed/YW/ |
9 KB 4 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iltnnalv.f.kk[0]
np.lexity.com/embed/YW/d1b8f31ef3a187b46ca5f5e0bd65e43a/v/xXo0tK1npyTB/k/PRWBzte3RDb4/u/http%3A%2F%2Fvidesignz.com%2Fsandbox%2Fuploader%2Fjs%2Falibaba%2Falibaba%2Findex.php/n/1525233682549/t/Alibab... |
20 B 340 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iltnnalv.f.kk[1]
np.lexity.com/embed/YW/d1b8f31ef3a187b46ca5f5e0bd65e43a/h/1/v/xXo0tK1npyTB/k/PRWBzte3RDb4/u/http%3A%2F%2Fvidesignz.com%2Fsandbox%2Fuploader%2Fjs%2Falibaba%2Falibaba%2Findex.php/n/1525233682549/t/Al... |
20 B 340 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Alibaba (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| iltnnalv object| _ycc object| _lex0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
np.lexity.com
videsignz.com
52.22.239.19
67.195.61.46
87dff24620906a1129b2db9eff9f58d93bbc93767c1da9c6de34663782773a0c
8c3a93e4536d8e3ccdffa285f175a93a181e27f35d6247ad81121c2b0a0a8691
c3de8a20b257b3e3edadd946d59bbee31d90f6f84ed6e9619904669199c0461e
c55290da88f9b88dcc6e593fa17a5281841b40f4324557c75cc5a2c5eb96f6ac
d4997ca6523c2ab88f457d9826ef04bac9a687a3606dc4647d1e3850a9e6e8c3
f789f6aa5304d63550e35f144eb65f131104ecb1e38cfacd51f7f63792579503
fec558c06855aa3a481e6c92bd777cd9c25d461eb2b9d32f72f62f4f8f7c4ebb