inhiver.us
Open in
urlscan Pro
104.248.60.190
Malicious Activity!
Public Scan
Effective URL: https://inhiver.us/wap-admin/edgemail/tm9c8rw6andfd5bd7612fvrp.php?rand=13InboxLightaspxn.1774256418&fid.4.12528996...
Submission: On October 09 via manual from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on September 26th 2018. Valid for: 3 months.
This is the only time inhiver.us was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 22 | 104.248.60.190 104.248.60.190 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
22 | 2 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
inhiver.us |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
inhiver.us
1 redirects
inhiver.us |
583 KB |
0 |
wans.net
Failed
wans.net Failed |
|
22 | 2 |
Domain | Requested by | |
---|---|---|
22 | inhiver.us |
1 redirects
inhiver.us
|
0 | wans.net Failed |
inhiver.us
|
22 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
inhiver.us cPanel, Inc. Certification Authority |
2018-09-26 - 2018-12-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://inhiver.us/wap-admin/edgemail/tm9c8rw6andfd5bd7612fvrp.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&text=abuse@wans.net&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: C28550C3100BC43CDFC947E6E8077966
Requests: 22 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://inhiver.us/wap-admin/edgemail/index.php?text=abuse@wans.net
HTTP 302
https://inhiver.us/wap-admin/edgemail/tm9c8rw6andfd5bd7612fvrp.php?rand=13InboxLightaspxn.17742... Page URL
Detected technologies
RoundCube (Web Mail) ExpandDetected patterns
- env /^(?:rcmail|rcube_|roundcube)/i
PHP (Programming Languages) Expand
Detected patterns
- url /\.php(?:$|\?)/i
- env /^(?:rcmail|rcube_|roundcube)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://inhiver.us/wap-admin/edgemail/index.php?text=abuse@wans.net
HTTP 302
https://inhiver.us/wap-admin/edgemail/tm9c8rw6andfd5bd7612fvrp.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&text=abuse@wans.net&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
tm9c8rw6andfd5bd7612fvrp.php
inhiver.us/wap-admin/edgemail/ Redirect Chain
|
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
inhiver.us/wap-admin/edgemail/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
inhiver.us/wap-admin/edgemail/FILES/ |
46 KB 47 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.css
inhiver.us/wap-admin/edgemail/plugins/jqueryui/themes/larry/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ui.js
inhiver.us/wap-admin/edgemail/FILES/ |
34 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
inhiver.us/wap-admin/edgemail/FILES/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.min.js
inhiver.us/wap-admin/edgemail/FILES/ |
13 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.min.js
inhiver.us/wap-admin/edgemail/FILES/ |
128 KB 129 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.min.js
inhiver.us/wap-admin/edgemail/FILES/ |
5 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.min.js
inhiver.us/wap-admin/edgemail/FILES/ |
231 KB 231 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
wans.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
linen.jpg
inhiver.us/wap-admin/edgemail/FILES/images/ |
358 B 358 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajaxloader.gif
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
369 B 369 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttons.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
366 B 366 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
addcontact.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
369 B 369 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
filetypes.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
368 B 368 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
listicons.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
368 B 368 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
messages.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
367 B 367 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
quota.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
364 B 364 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selector.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
367 B 367 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
splitter.png
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
367 B 367 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
watermark.jpg
inhiver.us/wap-admin/edgemail/skins/larry/images/ |
368 B 368 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- wans.net
- URL
- http://wans.net/favicon.ico
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)31 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| rcube_mail_ui function| rcube_scroller function| rcube_splitter function| $ function| jQuery number| CONTROL_KEY number| SHIFT_KEY number| CONTROL_SHIFT_KEY function| roundcube_browser object| rcube_event function| rcube_event_engine function| rcube_check_email function| rcube_clone_object function| urlencode function| rcube_find_object function| rcube_mouse_is_over function| setCookie function| getCookie function| rcube_console object| bw object| Base64 function| rcube_webmail object| jstz object| rcmail function| MM_findObj function| MM_validateForm object| jQuery1110006088288743097037 function| DP_jQuery_1539089807259 object| UI object| img1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
inhiver.us/ | Name: PHPSESSID Value: 7ps6trtnaqpouc0fg9ng12cqa1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
inhiver.us
wans.net
wans.net
104.248.60.190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