Submitted URL: http://klyanrahgaey.com/count.mail.163.comm.jkl.count.lhd.count.mail.163.comm/willip.php
Effective URL: https://klyanrahgaey.com/link2/bee/163/index.php?email=
Submission: On May 30 via automatic, source openphish

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 192.3.198.30, located in Buffalo, United States and belongs to AS-COLOCROSSING - ColoCrossing, US. The main domain is klyanrahgaey.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 1st 2019. Valid for: 3 months.
This is the only time klyanrahgaey.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: 163.cn (Online)

Domain & IP information

IP Address AS Autonomous System
1 3 192.3.198.30 36352 (AS-COLOCR...)
3 103.129.252.34 137263 (NETEASE-A...)
5 2
Apex Domain
Subdomains
Transfer
3 127.net
mimg.127.net
17 KB
3 klyanrahgaey.com
klyanrahgaey.com
217 KB
5 2
Domain Requested by
3 mimg.127.net klyanrahgaey.com
3 klyanrahgaey.com 1 redirects klyanrahgaey.com
5 2

This site contains links to these domains. Also see Links.

Domain
reg.163.com
reg.email.163.com
mail.163.com
ipad.mail.163.com
smart.mail.163.com
Subject Issuer Validity Valid
klyanrahgaey.com
cPanel, Inc. Certification Authority
2019-05-01 -
2019-07-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://klyanrahgaey.com/link2/bee/163/index.php?email=
Frame ID: 5A7FF9D07CC85C10579D85C826D826E7
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://klyanrahgaey.com/count.mail.163.comm.jkl.count.lhd.count.mail.163.comm/willip.php HTTP 302
    https://klyanrahgaey.com/link2/bee/163/index.php?email= Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

5
Requests

40 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

234 kB
Transfer

232 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://klyanrahgaey.com/count.mail.163.comm.jkl.count.lhd.count.mail.163.comm/willip.php HTTP 302
    https://klyanrahgaey.com/link2/bee/163/index.php?email= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.php
klyanrahgaey.com/link2/bee/163/
Redirect Chain
  • http://klyanrahgaey.com/count.mail.163.comm.jkl.count.lhd.count.mail.163.comm/willip.php
  • https://klyanrahgaey.com/link2/bee/163/index.php?email=
30 KB
31 KB
Document
General
Full URL
https://klyanrahgaey.com/link2/bee/163/index.php?email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.3.198.30 Buffalo, United States, ASN36352 (AS-COLOCROSSING - ColoCrossing, US),
Reverse DNS
192-3-198-30-host.colocrossing.com
Software
Apache /
Resource Hash
313c68b5724c08dd1989e527dcc576d37fb71e2fb42771fb8f4e6b7bbb48686d

Request headers

Host
klyanrahgaey.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 06:04:20 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 30 May 2019 06:04:20 GMT
Server
Apache
Location
https://klyanrahgaey.com/link2/bee/163/index.php?email=
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
163_bkg.jpg
klyanrahgaey.com/link2/bee/163/
186 KB
186 KB
Image
General
Full URL
https://klyanrahgaey.com/link2/bee/163/163_bkg.jpg
Requested by
Host: klyanrahgaey.com
URL: https://klyanrahgaey.com/link2/bee/163/index.php?email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.3.198.30 Buffalo, United States, ASN36352 (AS-COLOCROSSING - ColoCrossing, US),
Reverse DNS
192-3-198-30-host.colocrossing.com
Software
Apache /
Resource Hash
5b5c227969c41377ff4f6aef883b78775e82ff7d8c66f18bd3a832e44828d8b8

Request headers

Referer
https://klyanrahgaey.com/link2/bee/163/index.php?email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 06:04:20 GMT
Last-Modified
Sat, 04 Jun 2016 22:35:20 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
190206
login_v5.png
mimg.127.net/index/163/img/2013/
4 KB
4 KB
Image
General
Full URL
http://mimg.127.net/index/163/img/2013/login_v5.png
Requested by
Host: klyanrahgaey.com
URL: https://klyanrahgaey.com/link2/bee/163/index.php?email=
Protocol
HTTP/1.1
Server
103.129.252.34 , Hong Kong, ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK),
Reverse DNS
Software
nginx /
Resource Hash
8af8b8de1ecad45ba55cb3824728f4124f0966be0877381b36ba0ef195707401

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 06:04:21 GMT
Last-Modified
Wed, 17 Dec 2014 03:19:07 GMT
Server
nginx
ETag
"5490f62b-f6e"
X-Cache
HIT from HKGM
Content-Type
image/png
Access-Control-Allow-Origin
*.163.com *.126.com *.yeah.net *.tryfun.com
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3950
Expires
Thu, 30 May 2019 06:14:18 GMT
bg_v3.png
mimg.127.net/index/163/img/2013/
10 KB
11 KB
Image
General
Full URL
http://mimg.127.net/index/163/img/2013/bg_v3.png
Requested by
Host: klyanrahgaey.com
URL: https://klyanrahgaey.com/link2/bee/163/index.php?email=
Protocol
HTTP/1.1
Server
103.129.252.34 , Hong Kong, ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK),
Reverse DNS
Software
nginx /
Resource Hash
dd8b4abb72cdfaa00427d235cfa1a0efe27f528db7b61669d7328404d49cb623

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 06:04:21 GMT
Last-Modified
Wed, 06 Aug 2014 08:38:32 GMT
Server
nginx
ETag
"53e1e988-2920"
X-Cache
HIT from HKGM
Content-Type
image/png
Access-Control-Allow-Origin
*.163.com *.126.com *.yeah.net *.tryfun.com
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10528
Expires
Thu, 30 May 2019 06:38:27 GMT
mailapp_logo_141212.png
mimg.127.net/index/lib/img/
2 KB
2 KB
Image
General
Full URL
http://mimg.127.net/index/lib/img/mailapp_logo_141212.png
Requested by
Host: klyanrahgaey.com
URL: https://klyanrahgaey.com/link2/bee/163/index.php?email=
Protocol
HTTP/1.1
Server
103.129.252.34 , Hong Kong, ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK),
Reverse DNS
Software
nginx /
Resource Hash
d7916ca92b82038f9fb31b42361f28ec13a1c9339088ad8bd5911eb616003419

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 06:04:21 GMT
Last-Modified
Wed, 23 Mar 2016 09:26:25 GMT
Server
nginx
ETag
"56f26141-83f"
X-Cache
HIT from HKGM
Content-Type
image/png
Access-Control-Allow-Origin
*.163.com *.126.com *.yeah.net *.tryfun.com
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2111
Expires
Thu, 30 May 2019 06:22:27 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: 163.cn (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

0 Cookies