dhyana-yoga-book.com.ua
Open in
urlscan Pro
91.231.87.77
Malicious Activity!
Public Scan
Effective URL: https://dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/index.php?email=s******@r*************.com
Submission: On November 15 via api from ES — Scanned from ES
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on September 25th 2024. Valid for: a year.
This is the only time dhyana-yoga-book.com.ua was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 91.231.87.77 91.231.87.77 | 197726 (UKRNAMES-...) (UKRNAMES-AS Ukrainian Internet Names Center LTD) | |
7 | 1 |
ASN197726 (UKRNAMES-AS Ukrainian Internet Names Center LTD, UA)
PTR: hosting.ukrnames.com
dhyana-yoga-book.com.ua |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
dhyana-yoga-book.com.ua
dhyana-yoga-book.com.ua |
79 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
7 | dhyana-yoga-book.com.ua |
dhyana-yoga-book.com.ua
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dhyana-yoga-book.com.ua Sectigo RSA Domain Validation Secure Server CA |
2024-09-25 - 2025-10-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/index.php?email=s******@r*************.com
Frame ID: 35413F0BDF738E13DC748BA9A1A344E2
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
DHLPage URL History Show full URLs
-
http://dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/index.php?email=s******@r*************.com
HTTP 307
https://dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/index.php?email=s******@r*************.com Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/index.php?email=s******@r*************.com
HTTP 307
https://dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/index.php?email=s******@r*************.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
05.png
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/7629827763/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
en.jpg
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/7629827763/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
02.jpg
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/7629827763/ |
20 KB 20 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3638384.jpg
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/7629827763/ |
8 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xls.png
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/7629827763/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1618379409484992.jpg
dhyana-yoga-book.com.ua/wp-admin/images/aaa/china/7629827763/ |
4 KB 4 KB |
Other
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dhyana-yoga-book.com.ua
91.231.87.77
109483641b2f69473f1b978e4aec1ba11bb4f52c7ee92cb2c969f92b92925633
517000f92071e85b6fad9ffc86fdcb532330a11cea8e97efa55d59c5a1c4d85c
87a90aff7342aebb9bac98e99e9be3833731d16a97e07da7ca1f9b9434d915b8
901c8abcc67fe53992c93d741a937ff8e3ab418d114fcd984efe3e341f6a7455
9bd85f7569e570b6a8a40701baef5177a78e1daf0d3429ccdd55630224670c2d
d8a1fae00d96feaa8351178773878b3f51cacd4a922200470d6e7cd9e832089a
f06555d58c6fb19b7b6815ce631ea0958eeaec315dbc64b8dfb08e200c69eed5