Submitted URL: http://highriskstandards.info/document.html
Effective URL: https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Submission: On November 20 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 51.75.198.94, located in United Kingdom and belongs to OVH, FR. The main domain is help-ooddy.ga.
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 20th 2018. Valid for: 3 months.
This is the only time help-ooddy.ga was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online) American Express (Financial)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:30:... 13335 (CLOUDFLAR...)
2 6 51.75.198.94 16276 (OVH)
5 2
Apex Domain
Subdomains
Transfer
6 help-ooddy.ga
help-ooddy.ga
326 KB
1 highriskstandards.info
highriskstandards.info
792 B
5 2
Domain Requested by
6 help-ooddy.ga 2 redirects help-ooddy.ga
1 highriskstandards.info
5 2

This site contains no links.

Subject Issuer Validity Valid
help-ooddy.ga
cPanel, Inc. Certification Authority
2018-11-20 -
2019-02-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Frame ID: 8A12867FDDB3C224013A703E303B4EEF
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://highriskstandards.info/document.html Page URL
  2. https://help-ooddy.ga/clone/amiro HTTP 301
    https://help-ooddy.ga/clone/amiro/ HTTP 302
    https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Page Statistics

5
Requests

80 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

326 kB
Transfer

325 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://highriskstandards.info/document.html Page URL
  2. https://help-ooddy.ga/clone/amiro HTTP 301
    https://help-ooddy.ga/clone/amiro/ HTTP 302
    https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set document.html
highriskstandards.info/
149 B
792 B
Document
General
Full URL
http://highriskstandards.info/document.html
Protocol
HTTP/1.1
Server
2606:4700:30::681c:1f7d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1;mode=block

Request headers

Host
highriskstandards.info
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 20 Nov 2018 17:40:55 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Set-Cookie
__cfduid=dd176490575a11df61e6db62dd92b789d1542735655; expires=Wed, 20-Nov-19 17:40:55 GMT; path=/; domain=.highriskstandards.info; HttpOnly
X-Content-Type-Options
nosniff
X-XSS-Protection
1;mode=block
X-Frame-Options
SAMEORIGIN
Access-Control-Allow-Origin
*
X-Supported-By
Kloxo-MR 7.0
Last-Modified
Tue, 20 Nov 2018 16:22:52 GMT
Cache-Control
max-age=604800
Expires
Tue, 27 Nov 2018 17:40:55 GMT
Server
cloudflare
CF-RAY
47ccb453c792c2bf-FRA
Content-Encoding
gzip
Primary Request login.php
help-ooddy.ga/clone/amiro/
Redirect Chain
  • https://help-ooddy.ga/clone/amiro
  • https://help-ooddy.ga/clone/amiro/
  • https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
4 KB
4 KB
Document
General
Full URL
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
51.75.198.94 , United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
ip-51-75-198.eu
Software
Apache /
Resource Hash
4bb4871a9eedaa9c8a9a558f31636c4e1021b1852e78729d051060f4f019b823

Request headers

Host
help-ooddy.ga
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://highriskstandards.info/document.html
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://highriskstandards.info/document.html

Response headers

Date
Tue, 20 Nov 2018 17:40:55 GMT
Server
Apache
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Tue, 20 Nov 2018 17:40:55 GMT
Server
Apache
Location
login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Content-Length
0
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
MaskedPassword.js
help-ooddy.ga/clone/amiro/login_files/
17 KB
17 KB
Script
General
Full URL
https://help-ooddy.ga/clone/amiro/login_files/MaskedPassword.js
Requested by
Host: help-ooddy.ga
URL: https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
51.75.198.94 , United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
ip-51-75-198.eu
Software
Apache /
Resource Hash
2cfdb08c07395b0be65df154f068ade61c1bfad7e3e3e2d0e40b85319fa95825

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
help-ooddy.ga
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 20 Nov 2018 17:40:55 GMT
Last-Modified
Sat, 16 Dec 2017 05:46:12 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
16904
rsz_2016-05-17_162745.png
help-ooddy.ga/clone/amiro/login_files/
303 KB
304 KB
Image
General
Full URL
https://help-ooddy.ga/clone/amiro/login_files/rsz_2016-05-17_162745.png
Requested by
Host: help-ooddy.ga
URL: https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
51.75.198.94 , United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
ip-51-75-198.eu
Software
Apache /
Resource Hash
68187aeaa19dad775e2c6970e8310e206465a5a3a3b8abce43ab8663a4109659

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
help-ooddy.ga
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 20 Nov 2018 17:40:55 GMT
Last-Modified
Mon, 27 Mar 2017 08:05:52 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
310710
2015-01-28_200415.png
help-ooddy.ga/clone/amiro/login_files/
1 KB
1 KB
Image
General
Full URL
https://help-ooddy.ga/clone/amiro/login_files/2015-01-28_200415.png
Requested by
Host: help-ooddy.ga
URL: https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
51.75.198.94 , United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
ip-51-75-198.eu
Software
Apache /
Resource Hash
df1769d599e041d8b49ef89fc0acbed2d04c4ab004d64f4acbbb3e61e46b530e

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
help-ooddy.ga
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
https://help-ooddy.ga/clone/amiro/login.php?&sessionid=71a4080acea4388390cb9506aaec652b&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 20 Nov 2018 17:40:55 GMT
Last-Modified
Mon, 27 Mar 2017 08:04:06 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1193

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online) American Express (Financial)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| MaskedPassword

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1;mode=block