reoauthv1mail-2login.website.yandexcloud.net
Open in
urlscan Pro
2a02:6b8::1da
Malicious Activity!
Public Scan
Submission: On November 19 via manual from NL — Scanned from NL
Summary
This is the only time reoauthv1mail-2login.website.yandexcloud.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a02:6b8::1da 2a02:6b8::1da | 208722 (YNDX) (YNDX) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 66.29.134.197 66.29.134.197 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
11 | 4 |
ASN208722 (YNDX, FI)
reoauthv1mail-2login.website.yandexcloud.net |
ASN22612 (NAMECHEAP-NET, US)
PTR: server1.helazhelenvps.xyz
helazhelenvpslink.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
helazhelenvpslink.xyz
helazhelenvpslink.xyz |
55 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
yandexcloud.net
reoauthv1mail-2login.website.yandexcloud.net |
7 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
8 | helazhelenvpslink.xyz |
reoauthv1mail-2login.website.yandexcloud.net
|
1 | code.jquery.com |
reoauthv1mail-2login.website.yandexcloud.net
|
1 | cdnjs.cloudflare.com |
reoauthv1mail-2login.website.yandexcloud.net
|
1 | reoauthv1mail-2login.website.yandexcloud.net | |
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-21 - 2022-09-20 |
a year | crt.sh |
helazhelenvpslink.xyz cPanel, Inc. Certification Authority |
2021-10-23 - 2022-01-21 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://reoauthv1mail-2login.website.yandexcloud.net/
Frame ID: 7F9D04AFC8D13B2F8C0F1D78C2BC7354
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
reoauthv1mail-2login.website.yandexcloud.net/ |
44 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
helazhelenvpslink.xyz/folder7/lib/css/ |
100 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.svg
helazhelenvpslink.xyz/folder7/lib/img/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account.png
helazhelenvpslink.xyz/folder7/lib/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_more.png
helazhelenvpslink.xyz/folder7/lib/img/ |
192 B 434 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plus.svg
helazhelenvpslink.xyz/folder7/lib/img/ |
222 B 488 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
helazhelenvpslink.xyz/folder7/lib/img/ |
513 B 580 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
helazhelenvpslink.xyz/folder7/lib/img/ |
915 B 566 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
helazhelenvpslink.xyz/folder7/lib/img/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| $ function| jQuery function| true_email0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
helazhelenvpslink.xyz
reoauthv1mail-2login.website.yandexcloud.net
2001:4de0:ac18::1:a:1a
2606:4700::6810:135e
2a02:6b8::1da
66.29.134.197
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
1b8e9869c33c1086478e807f8537b155c84660c631c830d6a83d83accfd1ed18
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
36e0a7e08bee65774168528938072c536437669c1b7458ac77976ec788e4439c
5499b0eb61acf34c8ad6cea15f86b1b84f8b9fdcaf6e9333e6fcd4e91e08dbbe
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
a33593e9043efefbaf94d9ca220c885ce1c42dd2a7707f30ed072d7d71587da5
a3ec79086c71191b0dbc128b397d1a27d132bd2b658667bc4229b53cbcb20b05
f4195cc24b823ff3704e6501788245537de7c8f75e0c4b5efd874b1053f9807f