accountchallenge.ddns.net Open in urlscan Pro
45.122.138.54  Malicious Activity! Public Scan

Submitted URL: http://accountchallenge.ddns.net/upgrade/domain-auto-update/index.php
Effective URL: http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256...
Submission: On December 27 via manual from US

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 45.122.138.54, located in Mong Kok, Hong Kong and belongs to GGL-AS-AP Guochao Group limited, HK. The main domain is accountchallenge.ddns.net.
This is the only time accountchallenge.ddns.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 2 45.122.138.54 132742 (GGL-AS-AP...)
1 2.18.233.122 16625 (AKAMAI-AS)
2 3
Apex Domain
Subdomains
Transfer
2 ddns.net
accountchallenge.ddns.net
40 KB
1 ui-portal.de
img.ui-portal.de
232 B
2 2
Domain Requested by
2 accountchallenge.ddns.net 1 redirects
1 img.ui-portal.de accountchallenge.ddns.net
2 2

This site contains no links.

Subject Issuer Validity Valid
img.ui-portal.de
GeoTrust RSA CA 2018
2018-07-04 -
2019-09-02
a year crt.sh

This page contains 1 frames:

Primary Page: http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: A84FE961815C2DF632577A261341DF8F
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://accountchallenge.ddns.net/upgrade/domain-auto-update/index.php HTTP 302
    http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13Inbox... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

2
Requests

50 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

39 kB
Transfer

62 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://accountchallenge.ddns.net/upgrade/domain-auto-update/index.php HTTP 302
    http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 3edui19bgjhqb0zm6zdokh3f.php
accountchallenge.ddns.net/upgrade/domain-auto-update/
Redirect Chain
  • http://accountchallenge.ddns.net/upgrade/domain-auto-update/index.php
  • http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
39 KB
39 KB
Document
General
Full URL
http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
HTTP/1.1
Server
45.122.138.54 Mong Kok, Hong Kong, ASN132742 (GGL-AS-AP Guochao Group limited, HK),
Reverse DNS
Software
Apache /
Resource Hash
f39c60a728868521876907078a358d7f6e6185f8e0f523cfb62bab0560d33a77

Request headers

Host
accountchallenge.ddns.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=g66u3b5o17mlp1bu76pv04cha2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 27 Dec 2018 12:34:25 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 27 Dec 2018 12:34:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Set-Cookie
PHPSESSID=g66u3b5o17mlp1bu76pv04cha2; path=/
Location
3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4#n=1252899642&fid=1&fav=1
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
p.gif
img.ui-portal.de/
42 B
232 B
Image
General
Full URL
https://img.ui-portal.de/p.gif
Requested by
Host: accountchallenge.ddns.net
URL: http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.122 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-122.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
http://accountchallenge.ddns.net/upgrade/domain-auto-update/3edui19bgjhqb0zm6zdokh3f.php?email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 27 Dec 2018 12:34:26 GMT
last-modified
Thu, 08 Aug 2002 13:23:51 GMT
server
Apache
etag
"2a-3a7b33340c7c0"
content-type
image/gif
status
200
cache-control
max-age=2592000, public
accept-ranges
bytes
x-robots-tag
noindex
content-length
42
expires
Fri, 29 Dec 2017 11:24:50 GMT
truncated
/
23 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ec062ab5eb68e0bfb63e327c19ab4e848f4c44648247f846c76445b432837128

Request headers

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| check

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

accountchallenge.ddns.net
img.ui-portal.de
2.18.233.122
45.122.138.54
ec062ab5eb68e0bfb63e327c19ab4e848f4c44648247f846c76445b432837128
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
f39c60a728868521876907078a358d7f6e6185f8e0f523cfb62bab0560d33a77