211.22.108.239
Open in
urlscan Pro
211.22.108.239
Malicious Activity!
Public Scan
Submission: On February 26 via manual from IT
Summary
This is the only time 211.22.108.239 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: 163.cn (Online) Generic China (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 211.22.108.239 211.22.108.239 | 3462 (HINET Dat...) (HINET Data Communication Business Group) | |
12 | 103.129.252.34 103.129.252.34 | 137263 (NETEASE-A...) (NETEASE-AS-AP NETEASE HONG KONG LIMITED) | |
1 | 54.64.105.68 54.64.105.68 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
16 | 4 |
ASN3462 (HINET Data Communication Business Group, TW)
PTR: 211-22-108-239.HINET-IP.hinet.net
211.22.108.239 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-64-105-68.ap-northeast-1.compute.amazonaws.com
mail.163.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
127.net
mimg.127.net |
36 KB |
1 |
163.com
ssl.mail.163.com Failed mail.163.com |
|
16 | 2 |
Domain | Requested by | |
---|---|---|
12 | mimg.127.net |
211.22.108.239
|
1 | mail.163.com |
211.22.108.239
|
0 | ssl.mail.163.com Failed |
211.22.108.239
|
16 | 3 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://211.22.108.239/why/
Frame ID: 727E15B2A80E1C0A1F8242E07FF8EA91
Requests: 15 HTTP requests in this frame
Frame:
http://mail.163.com/preload6.htm
Frame ID: 90BE62B2AE18AF99430B744876DD12D6
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Perl (Programming Languages) Expand
Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_perl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_perl(?:\/([\d\.]+))?/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
23 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: 免费邮
Search URL Search Domain Scan URL
Title: 企业邮箱
Search URL Search Domain Scan URL
Title: VIP邮箱
Search URL Search Domain Scan URL
Title: 国外用户登录
Search URL Search Domain Scan URL
Title: 学生用户登录
Search URL Search Domain Scan URL
Title: 手机客户端
Search URL Search Domain Scan URL
Title: 帮助
Search URL Search Domain Scan URL
Title: 在线答疑
Search URL Search Domain Scan URL
Title: 下载邮箱大师
Search URL Search Domain Scan URL
Title: 忘记密码了?
Search URL Search Domain Scan URL
Title: 注 册
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: 适配iPad版本
Search URL Search Domain Scan URL
Title: 手机智能版
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title: 关于网易免费邮
Search URL Search Domain Scan URL
Title: 一元夺宝
Search URL Search Domain Scan URL
Title: 邮箱官方博客
Search URL Search Domain Scan URL
Title: 意见反馈>>
Search URL Search Domain Scan URL
Title: 网易云音乐
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
211.22.108.239/why/ |
96 KB 96 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base_v5.js
211.22.108.239/why/ |
18 KB 18 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
163logo.gif
mimg.127.net/logo/ |
7 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t.gif
mimg.127.net/index/lib/img/ |
77 B 473 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading_s.gif
mimg.127.net/index/lib/img/ |
578 B 976 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
netease_logo.gif
mimg.127.net/logo/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
knet.png
mimg.127.net/logo/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
year.js
mimg.127.net/copyright/ |
23 B 410 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
130523_music.png
mimg.127.net/index/163/effects/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_v3.png
mimg.127.net/index/163/img/2013/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new.png
mimg.127.net/index/lib/img/ |
225 B 601 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login_v5.png
mimg.127.net/index/163/img/2013/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_code.png
mimg.127.net/index/lib/img/ |
230 B 606 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mailapp_logo_141212.png
mimg.127.net/index/lib/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
httpsEnable.gif
ssl.mail.163.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
preload6.htm
mail.163.com/ Frame 90BE |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ssl.mail.163.com
- URL
- https://ssl.mail.163.com/httpsEnable.gif
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: 163.cn (Online) Generic China (Online)73 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| gOption function| fCheckLoginNow function| fCheckAutoLogin function| fAutoLogin boolean| gbForcepc object| oAndroidRedirect function| fCheckBrowser function| fHtml5Tag function| fCheckCookie function| fGetQuery function| fGetQueryHash function| $id function| fTrim function| fParseMNum function| fCheckAccount function| fGetScript function| fGetCookie function| fSetCookie function| fEventListen function| fEventUnlisten function| fRandom function| fUrlP function| fResize function| fJSONP function| fFQ function| fStartTime object| gUserInfo object| gVisitorCookie undefined| gMobileNumMailIsForbidden undefined| gMobileNumMailResult object| gMobileNumMail function| fEnData function| loginRequest function| getRnd undefined| DOMContentLoaded function| DOMREADY string| base64EncodeChars function| base64encode function| utf16to8 function| fGetLocator function| CapsLock function| MobCallback boolean| bGettingAlgorithm object| loginExtAD undefined| gAdUserPropertyData object| gAdResData object| gErrorInfo object| oStyle function| fCls object| oSpdTestPosition object| aSpdResult object| aSpdStartTime object| aSpdEndTime object| aSpdTmpTime object| aSpdQueue boolean| bSpdAuto string| sLocationInfo function| fSpeedTestPre function| fSpeedTest function| fSpd function| fLocationDot object| aLocationDot function| fSelectLoaction function| fSpdUserInit function| fLocationChoose function| fSetLocation function| fNetErrDebug object| indexLogin object| themeHandler object| gAdTemplate_lbp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.163.com
mimg.127.net
ssl.mail.163.com
ssl.mail.163.com
103.129.252.34
211.22.108.239
54.64.105.68
023d73df488b8a7bea06ab2c3fe3db4366b3f69999f65e83001dbbbda91b9a4e
065f86db73775341c54048befea1dbd24e6013780ce06db950cee6e5908463be
098ec9249cb3e97872e1862b4400b9db4c6622a4d089b64b752ffc73b3ef7a30
17add961a686edb5b25996bcc4e08a14e5e36b6a1796ffbbb9cc751e7ca97ac8
2686970c3d70ca85cf129efa9c9297278b60b9af0357a0396ff7a11c08cca6d5
3f666934b806964af9be68a39f16151701e7a7b8009ac24e7acb9ac0a7c10aa5
629358b38df917468e648571e26aa879f5c3cb8cca934651f49646141c37fb8b
8af8b8de1ecad45ba55cb3824728f4124f0966be0877381b36ba0ef195707401
8e5fbde0ebbcc317b159bc9f681b83117d152e55634cbcb617281e896e41ee2b
b13de2eb10e93a66f6332b6ccb258bcf1502362a89b91c16f78ea425562e40a0
d18e6296a534078009774d635cbf390933c93c8758e2a3a990cb9b1a3d9c7199
d7916ca92b82038f9fb31b42361f28ec13a1c9339088ad8bd5911eb616003419
d89a3449505416c5c98e43f5b1db73d56a3fd4e7eea48e047d028e87857d7236
dd8b4abb72cdfaa00427d235cfa1a0efe27f528db7b61669d7328404d49cb623