mosquito-monster.com Open in urlscan Pro
50.87.249.74  Malicious Activity! Public Scan

Submitted URL: https://mosquito-monster.com/aqstspace/proposal
Effective URL: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642...
Submission: On July 01 via automatic, source openphish

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 7 HTTP transactions. The main IP is 50.87.249.74, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is mosquito-monster.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on May 10th 2019. Valid for: 3 months.
This is the only time mosquito-monster.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Sharepoint (Online) Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 7 50.87.249.74 46606 (UNIFIEDLA...)
1 2a00:1450:400... 15169 (GOOGLE)
7 3
Apex Domain
Subdomains
Transfer
7 mosquito-monster.com
mosquito-monster.com
26 KB
1 googleapis.com
fonts.googleapis.com
605 B
7 2
Domain Requested by
7 mosquito-monster.com 2 redirects mosquito-monster.com
1 fonts.googleapis.com mosquito-monster.com
7 2

This site contains no links.

Subject Issuer Validity Valid
mosquito-monster.com
Let's Encrypt Authority X3
2019-05-10 -
2019-08-08
3 months crt.sh
*.googleapis.com
Google Internet Authority G3
2019-06-18 -
2019-09-10
3 months crt.sh

This page contains 1 frames:

Primary Page: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Frame ID: 3E7597FB02B24F4A538BBDCF8BD4FC01
Requests: 8 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://mosquito-monster.com/aqstspace/proposal HTTP 301
    https://mosquito-monster.com/aqstspace/proposal/ HTTP 302
    https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.17742... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

7
Requests

86 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

29 kB
Transfer

42 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://mosquito-monster.com/aqstspace/proposal HTTP 301
    https://mosquito-monster.com/aqstspace/proposal/ HTTP 302
    https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request t4hvbhotei5vgqxo0ncgybl1.php
mosquito-monster.com/aqstspace/proposal/
Redirect Chain
  • https://mosquito-monster.com/aqstspace/proposal
  • https://mosquito-monster.com/aqstspace/proposal/
  • https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
4 KB
2 KB
Document
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
73ca719681edf754fe5a4de0c238e6dbb8cc125a7548582d01a1f9715ef0aa98

Request headers

:method
GET
:authority
mosquito-monster.com
:scheme
https
:path
/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
cookie
PHPSESSID=2llfid94hoimutnfr6vktaiua1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx/1.14.1
date
Mon, 01 Jul 2019 22:07:51 GMT
content-type
text/html
content-encoding
gzip

Redirect headers

status
302
server
nginx/1.14.1
date
Mon, 01 Jul 2019 22:07:50 GMT
content-type
text/html
location
t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma
no-cache
set-cookie
PHPSESSID=2llfid94hoimutnfr6vktaiua1; path=/
css
fonts.googleapis.com/
2 KB
605 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:600
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
0f053e63258c79fdeb028177f528b7789b9c03b1323def7bce2ce952ca1d51cb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Mon, 01 Jul 2019 22:07:51 GMT
server
ESF
access-control-allow-origin
*
date
Mon, 01 Jul 2019 22:07:51 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Mon, 01 Jul 2019 22:07:51 GMT
share-point.css
mosquito-monster.com/aqstspace/proposal/css/
15 KB
7 KB
Stylesheet
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/css/share-point.css
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
2ee69aef3afb10b368bde9fea7e97cc75c030c890e3d2b8dc4ad19d498234dbf

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:52 GMT
content-encoding
gzip
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
content-type
text/css
logo.png
mosquito-monster.com/aqstspace/proposal/img/
3 KB
3 KB
Image
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/img/logo.png
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
825de044d5ac6442a094ff95099f9f67e9249a8110a2fbd57128285776632adb

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:52 GMT
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
accept-ranges
bytes
content-length
3331
content-type
image/png
pdf.png
mosquito-monster.com/aqstspace/proposal/img/
7 KB
7 KB
Image
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/img/pdf.png
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
db307fcef7f95139689007d7a623b340ec21282bd421c4e4b2ba09078f230545

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:52 GMT
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
accept-ranges
bytes
content-length
6830
content-type
image/png
logo_strip.png
mosquito-monster.com/aqstspace/proposal/img/
7 KB
7 KB
Image
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/img/logo_strip.png
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
d1f126b54d456b3d15be32e56fa230cb8a9d4b5b3cfa8e0e2b0386431c869fba

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/t4hvbhotei5vgqxo0ncgybl1.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:52 GMT
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
accept-ranges
bytes
content-length
7541
content-type
image/png
css
fonts.googleapis.com/
0
0

truncated
/
2 KB
2 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
29b7a9358abdc68c51db5a5af4a4f4e2e041a67527adee2366b1f84f116fe9a5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Origin
https://mosquito-monster.com

Response headers

Content-Type
application/octet-stream

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fonts.googleapis.com
URL
https://fonts.googleapis.com/css?family=Open+Sans:600

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Sharepoint (Online) Microsoft (Consumer)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

0 Cookies