gpbapps.net
Open in
urlscan Pro
66.111.11.103
Malicious Activity!
Public Scan
Effective URL: https://gpbapps.net/driv/index2.php
Submission: On December 11 via manual from GB
Summary
TLS certificate: Issued by RapidSSL RSA CA 2018 on April 10th 2019. Valid for: a year.
This is the only time gpbapps.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 164.68.116.221 164.68.116.221 | 51167 (CONTABO) (CONTABO) | |
1 6 | 66.111.11.103 66.111.11.103 | 11403 (NYINTERNET) (NYINTERNET - NYI) | |
7 | 2 |
ASN51167 (CONTABO, DE)
PTR: vmi290762.contaboserver.net
www.wareymein.com |
ASN11403 (NYINTERNET - NYI, US)
PTR: 66.111.11.103.static.nyinternet.net
gpbapps.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
gpbapps.net
1 redirects
gpbapps.net |
195 KB |
2 |
wareymein.com
www.wareymein.com |
91 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | gpbapps.net |
1 redirects
www.wareymein.com
gpbapps.net |
2 | www.wareymein.com |
www.wareymein.com
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
wareymein.com cPanel, Inc. Certification Authority |
2019-11-06 - 2020-02-04 |
3 months | crt.sh |
*.gpbapps.net RapidSSL RSA CA 2018 |
2019-04-10 - 2020-05-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://gpbapps.net/driv/index2.php
Frame ID: DA7B2739DD9FD07EFEE1976CBE331FB1
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://www.wareymein.com/i/?YpPat= Page URL
-
https://gpbapps.net/driv/?Patid2Patid=
HTTP 302
https://gpbapps.net/driv/index2.php Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.wareymein.com/i/?YpPat= Page URL
-
https://gpbapps.net/driv/?Patid2Patid=
HTTP 302
https://gpbapps.net/driv/index2.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.wareymein.com/i/ |
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.wareymein.com/i/js/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index2.php
gpbapps.net/driv/ Redirect Chain
|
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
point.gif
gpbapps.net/driv/:abstract.simplenet.com/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
point2.html
gpbapps.net/driv/abstract.simplenet.com/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
gpbapps.net/driv/files/ |
82 KB 83 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.gif
gpbapps.net/driv/files/ |
101 KB 101 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| preloadimages number| intervals string| targetdestination object| splashmessage string| openingtags string| closingtags number| ns4 number| ie4 number| ns6 object| theimages function| displaysplash function| displaysplash_ns function| positionsplashcontainer number| p number| jv object| sc_cross0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gpbapps.net
www.wareymein.com
164.68.116.221
66.111.11.103
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
21307da7adc5e8938405ce5202b788a129e90a226bc75e51afa8e9d1e55ef04e
24897c995140b9540d76477195c15ee0f7b82bce5c56b73d740a2811ea2c7bde
3bfed2833f76afe747cd3ea2f0dd04dd00420e418706de65d9449b9dbf036e78
5723f43922f5050b67f4e2754abde283aa43ad4df31069a0f0a08aa4cffd7515
6957b66a144b5ff7d87776bbc016f740afaf353ca5230517378c761a790e4ae3
ee8ce851a39de0d898dc84b138366c3cec78b8e0676afc391387d5cfdfcd314d