kummara.com
Open in
urlscan Pro
2606:4700:30::681b:8fbd
Malicious Activity!
Public Scan
Submission: On December 14 via api from GB
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on February 26th 2019. Valid for: a year.
This is the only time kummara.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic China (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:30:... 2606:4700:30::681b:8fbd | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
10 | 103.129.252.34 103.129.252.34 | 137263 (NETEASE-A...) (NETEASE-AS-AP NETEASE HONG KONG LIMITED) | |
14 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
kummara.com |
ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK)
mimg.127.net | |
mail.163.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
127.net
mimg.127.net |
78 KB |
1 |
163.com
ssl.mail.163.com Failed analytics.163.com Failed mail.163.com iplocator.mail.163.com Failed |
|
1 |
kummara.com
kummara.com |
15 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
9 | mimg.127.net |
kummara.com
|
1 | mail.163.com |
kummara.com
|
1 | kummara.com | |
0 | iplocator.mail.163.com Failed |
mimg.127.net
|
0 | analytics.163.com Failed |
kummara.com
|
0 | ssl.mail.163.com Failed |
kummara.com
|
14 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.163.com |
vipmail.163.com |
hw.mail.163.com |
help.163.com |
reg.163.com |
reg.email.163.com |
qiye.163.com |
corp.163.com |
mail.163.com |
mail.blog.163.com |
ss.cnnic.cn |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-02-26 - 2020-02-26 |
a year | crt.sh |
mimg.127.net GeoTrust CN RSA CA G1 |
2019-07-11 - 2021-09-08 |
2 years | crt.sh |
*.163.com GeoTrust RSA CA 2018 |
2018-12-20 - 2020-03-20 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://kummara.com/carpediem/netease.co.cn/email.163.com.htm
Frame ID: B410122728B7789CBB0D0C727EDAC805
Requests: 13 HTTP requests in this frame
Frame:
https://mail.163.com/preload5.htm
Frame ID: 4DAE32F86738106FC9CADB22B6E5AAC8
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: 收费邮
Search URL Search Domain Scan URL
Title: 国外用户登录
Search URL Search Domain Scan URL
Title: 帮助
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: 忘记密码?
Search URL Search Domain Scan URL
Title: 立即注册
Search URL Search Domain Scan URL
Title: 进入管理员登录页面
Search URL Search Domain Scan URL
Title: 关于网易
Search URL Search Domain Scan URL
Title: 关于网易免费邮
Search URL Search Domain Scan URL
Title: 邮箱官方博客
Search URL Search Domain Scan URL
Title: 客户服务
Search URL Search Domain Scan URL
Title: 隐私政策
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
email.163.com.htm
kummara.com/carpediem/netease.co.cn/ |
59 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base_v3.js
mimg.127.net/index/lib/scripts/ |
23 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ntes_logo.png
mimg.127.net/index/email/img/2012/ |
983 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t.gif
mimg.127.net/p/ |
77 B 478 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
knet.png
mimg.127.net/logo/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
httpsEnable.gif
ssl.mail.163.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
ntes.js
analytics.163.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
mimg.127.net/index/email/img/2012/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bgx.png
mimg.127.net/index/email/img/2012/ |
304 B 628 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
mimg.127.net/index/email/img/2012/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arr.png
mimg.127.net/index/email/img/2012/ |
492 B 816 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.jpg
mimg.127.net/index/email/img/2012/ |
38 KB 38 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
preload5.htm
mail.163.com/ Frame 4DAE |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
iplocator
iplocator.mail.163.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ssl.mail.163.com
- URL
- https://ssl.mail.163.com/httpsEnable.gif
- Domain
- analytics.163.com
- URL
- https://analytics.163.com/ntes.js
- Domain
- iplocator.mail.163.com
- URL
- http://iplocator.mail.163.com/iplocator?callback=fGetLocator
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic China (Online)116 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| gOption function| fCheckLoginNow function| fCheckAutoLogin function| fAutoLogin undefined| gbForcepc object| oAndroidRedirect function| fCheckBrowser function| fHtml5Tag function| fCheckCookie function| fGetQuery function| fGetQueryHash function| $id function| fTrim function| fParseMNum function| fCheckAccount function| fGetScript function| fGetCookie function| fSetCookie function| fEventListen function| fEventUnlisten function| fRandom function| fUrlP function| fResize function| fFQ function| fStartTime object| gUserInfo object| gVisitorCookie undefined| gMobileNumMailIsForbidden undefined| gMobileNumMailResult object| gMobileNumMail function| fEnData function| loginRequest function| getRnd undefined| DOMContentLoaded function| DOMREADY string| base64EncodeChars function| base64encode function| utf16to8 function| fGetLocator function| fSetGadIndex function| MobCallback boolean| bGettingAlgorithm object| gIndexAd boolean| bForcepc boolean| bPreviewPc string| _ntes_nacc object| gWindow function| fCalc function| fChangeBg object| oMain object| oMainHd function| fChangePos function| fCheckboxChange string| gCurrentDomain object| gLoginInfo boolean| bIsEuid object| sPreUrl object| sPreUid object| sPreReason object| sUid object| sStyle undefined| sEnUsername object| oForm object| oFormQiye object| oUrl2 object| oUserName object| oUserIpt object| oTxtAccount object| oTxtPwd object| oDomain object| oDomainQiye object| oStyle object| oGetPwd object| oLoginOpt object| oErr object| oLoginFtTips object| oIdL object| oIdLabel object| oPwL object| oPwLabel function| fSwitchTab function| fSwitchUserInfo function| fSecureLinkage function| fSubmit function| fSetAction function| fSaveLoginInfo function| fCheckqiye function| fGetQiyeMsg function| fStyleEvent function| fCls function| fIdInputEvent function| fCheckAlways undefined| oPopup undefined| oPopupClose undefined| oPopupCont undefined| oPopupSub undefined| oMask function| fKX string| sLocationInfo function| fSetLocation function| fNetErrDebug object| oSpdTestPosition object| aSpdResult object| aSpdStartTime object| aSpdEndTime object| aSpdTmpTime object| aSpdQueue function| fSpeedTestPre function| fSpeedTest function| fSpd undefined| fShowPopup undefined| fHidePopup number| oIntervalCheckAlways boolean| bSpdAuto0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
analytics.163.com
iplocator.mail.163.com
kummara.com
mail.163.com
mimg.127.net
ssl.mail.163.com
analytics.163.com
iplocator.mail.163.com
ssl.mail.163.com
103.129.252.34
2606:4700:30::681b:8fbd
00cad05d5e9ff9011f003c4f9eb9b0bb0b47cbaf8be7c50ac90ee2c122a0e553
16ede25c08f54c3b1627d401b847eec08b089227058660799c2372dbd6f52425
17add961a686edb5b25996bcc4e08a14e5e36b6a1796ffbbb9cc751e7ca97ac8
3f666934b806964af9be68a39f16151701e7a7b8009ac24e7acb9ac0a7c10aa5
4f351f075b297bc471bc0a3f4abc39bee04204393a1543c06fab5b2a5e85264d
75504d17088f01fd3d96848402052b5c6d96965303fcff93482d8a7bbee87de8
86305704cb5ce03d2ce2c34224ecd1f54bfad514a5980bd9453fab19858af4d5
8c65da2d6f0962332bfc51374752fc99fb033b06cd0c4fbf2bbc96c19f3748ee
a0ceb7edc5991f85a9613588811fee01502816f4a31ed92b19b348c07854f052
e4129228b3c1d9183ed091b163797dddf16a2cf72868bb4fa56c98e7a074686d