Submitted URL: http://kjsdf89ih.skclick.in/
Effective URL: http://skclick.in/redirect.php?id=kjsdf89ih
Submission: On November 18 via manual from US

Summary

This website contacted 4 IPs in 3 countries across 3 domains to perform 8 HTTP transactions. The main IP is 5.9.145.189, located in Germany and belongs to HETZNER-AS, DE. The main domain is skclick.in.
This is the only time skclick.in was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
2 4 5.9.145.189 24940 (HETZNER-AS)
1 2 88.212.196.77 39134 (UNITEDNET)
4 199.241.138.100 53340 (FIBERHUB)
8 4
Apex Domain
Subdomains
Transfer
4 servehttp.com
mypayment-disputed.servehttp.com Failed
109 KB
4 skclick.in
kjsdf89ih.skclick.in
skclick.in
3 KB
2 yadro.ru
counter.yadro.ru
2 KB
8 3
Domain Requested by
4 mypayment-disputed.servehttp.com mypayment-disputed.servehttp.com
3 skclick.in 1 redirects skclick.in
2 counter.yadro.ru 1 redirects skclick.in
1 kjsdf89ih.skclick.in 1 redirects
8 4

This site contains no links.

Subject Issuer Validity Valid
mypayment-disputed.servehttp.com
Let's Encrypt Authority X3
2017-11-17 -
2018-02-15
3 months crt.sh

This page contains 2 frames:

Frame: https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Frame ID: 25516.1
Requests: 4 HTTP requests in this frame

Frame: https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Frame ID: 25536.1
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://kjsdf89ih.skclick.in/ HTTP 301
    http://skclick.in/kjsdf89ih/ HTTP 302
    http://skclick.in/redirect.php?id=kjsdf89ih Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js/i

Page Statistics

8
Requests

50 %
HTTPS

0 %
IPv6

3
Domains

4
Subdomains

4
IPs

3
Countries

113 kB
Transfer

119 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://kjsdf89ih.skclick.in/ HTTP 301
    http://skclick.in/kjsdf89ih/ HTTP 302
    http://skclick.in/redirect.php?id=kjsdf89ih Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • http://counter.yadro.ru/hit?t21.1;r;s1600*1200*24;uhttp%3A//skclick.in/redirect.php%3Fid%3Dkjsdf89ih;0.8501944702731259 HTTP 302
  • http://counter.yadro.ru/hit?q;t21.1;r;s1600*1200*24;uhttp%3A//skclick.in/redirect.php%3Fid%3Dkjsdf89ih;0.8501944702731259
Request Chain 2
  • http://flyt.it/clientarea HTTP 301
  • https://mypayment-disputed.servehttp.com/myaccount/signin/ HTTP 302
  • https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547 HTTP 301
  • https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/ HTTP 302
  • https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request redirect.php
skclick.in/
Redirect Chain
  • http://kjsdf89ih.skclick.in/
  • http://skclick.in/kjsdf89ih/
  • http://skclick.in/redirect.php?id=kjsdf89ih
1 KB
787 B
Document
General
Full URL
http://skclick.in/redirect.php?id=kjsdf89ih
Protocol
HTTP/1.1
Server
5.9.145.189 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.189.145.9.5.clients.your-server.de
Software
nginx / PHP/5.6.31-6+ubuntu14.04.1+deb.sury.org+1
Resource Hash
ad2fc3377987b1c86c415223a157bb2390672cead157166941048c78b1f60ce5
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
skclick.in
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Sat, 18 Nov 2017 22:46:45 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
nginx
X-Powered-By
PHP/5.6.31-6+ubuntu14.04.1+deb.sury.org+1
Strict-Transport-Security
max-age=631138519
Content-Type
text/html; charset=utf8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
X-XSS-Protection
1; mode=block

Redirect headers

Date
Sat, 18 Nov 2017 22:46:45 GMT
X-Content-Type-Options
nosniff
Server
nginx
Strict-Transport-Security
max-age=631138519
Content-Type
text/html
Location
http://skclick.in/redirect.php?id=kjsdf89ih
Connection
keep-alive
Content-Length
154
X-XSS-Protection
1; mode=block
style.css
skclick.in/templates/def/img/
8 KB
2 KB
Stylesheet
General
Full URL
http://skclick.in/templates/def/img/style.css
Requested by
Host: skclick.in
URL: http://skclick.in/redirect.php?id=kjsdf89ih
Protocol
HTTP/1.1
Server
5.9.145.189 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.189.145.9.5.clients.your-server.de
Software
nginx /
Resource Hash
33ef897751278e6f04900cec3e0326deb35be21df70e3b4113e69270f2bc3de4
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
skclick.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://skclick.in/redirect.php?id=kjsdf89ih
Connection
keep-alive
Cache-Control
no-cache
Referer
http://skclick.in/redirect.php?id=kjsdf89ih
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Sat, 18 Nov 2017 22:46:45 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Sun, 27 Dec 2015 11:41:16 GMT
Server
nginx
ETag
W/"567fce5c-1ea3"
Strict-Transport-Security
max-age=631138519
Content-Type
text/css
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
X-XSS-Protection
1; mode=block
Cookie set hit
counter.yadro.ru/
Redirect Chain
  • http://counter.yadro.ru/hit?t21.1;r;s1600*1200*24;uhttp%3A//skclick.in/redirect.php%3Fid%3Dkjsdf89ih;0.8501944702731259
  • http://counter.yadro.ru/hit?q;t21.1;r;s1600*1200*24;uhttp%3A//skclick.in/redirect.php%3Fid%3Dkjsdf89ih;0.8501944702731259
1 KB
1 KB
Image
General
Full URL
http://counter.yadro.ru/hit?q;t21.1;r;s1600*1200*24;uhttp%3A//skclick.in/redirect.php%3Fid%3Dkjsdf89ih;0.8501944702731259
Requested by
Host: skclick.in
URL: http://skclick.in/redirect.php?id=kjsdf89ih
Protocol
HTTP/1.1
Server
88.212.196.77 , Russian Federation, ASN39134 (UNITEDNET, RU),
Reverse DNS
host37.rax.ru
Software
0W/0.8c /
Resource Hash
26d7fcc3e8affeb8af536455fa243517713a5429649473e98d22c7f01a81edf2

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
counter.yadro.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://skclick.in/redirect.php?id=kjsdf89ih
Cookie
FTID=1Q4BXM2-yafe1Q4BXM00669V
Connection
keep-alive
Cache-Control
no-cache
Referer
http://skclick.in/redirect.php?id=kjsdf89ih
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 18 Nov 2017 22:46:46 GMT
Server
0W/0.8c
Connection
Close
P3P
policyref="/w3c/p3p.xml", CP="UNI"
Cache-control
no-cache
Set-Cookie
VID=0FUO-y1ePbve1Q4BXM00669Y; path=/; expires=Sun, 18 Nov 2018 21:00:00 GMT; domain=.yadro.ru
Content-Type
image/gif
Content-Length
1176
Expires
Fri, 18 Nov 2016 21:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Sat, 18 Nov 2017 22:46:46 GMT
Server
0W/0.8c
P3P
policyref="/w3c/p3p.xml", CP="UNI"
Location
http://counter.yadro.ru/hit?q;t21.1;r;s1600*1200*24;uhttp%3A//skclick.in/redirect.php%3Fid%3Dkjsdf89ih;0.8501944702731259
Cache-control
no-cache
Set-Cookie
FTID=1Q4BXM2-yafe1Q4BXM00669V; path=/; expires=Sun, 18 Nov 2018 21:00:00 GMT; domain=.yadro.ru
Content-Type
text/html
Content-Length
32
Expires
Fri, 18 Nov 2016 21:00:00 GMT
/
mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/
Redirect Chain
  • http://flyt.it/clientarea
  • https://mypayment-disputed.servehttp.com/myaccount/signin/
  • https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547
  • https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/
  • https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
0
0

/
mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/ Frame 2553
7 KB
7 KB
Document
General
Full URL
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.241.138.100 Elk Grove Village, United States, ASN53340 (FIBERHUB - VegasNAP, LLC, US),
Reverse DNS
writing-count.timedrought.com
Software
Apache /
Resource Hash
4d8070e538df6c5a786c7cc6f34c4484cf3a0bf5a8685918a5e2d9810f2a66ed

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mypayment-disputed.servehttp.com
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://skclick.in/redirect.php?id=kjsdf89ih
Cookie
PHPSESSID=pif63v0b976fheo592shovil86
Connection
keep-alive
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
Referer
http://skclick.in/redirect.php?id=kjsdf89ih
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 18 Nov 2017 22:42:08 GMT
Server
Apache
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Expires
Thu, 19 Nov 1981 08:52:00 GMT
L-Z118.css
mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/css/ Frame 2553
13 KB
13 KB
Stylesheet
General
Full URL
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/css/L-Z118.css
Requested by
Host: mypayment-disputed.servehttp.com
URL: https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.241.138.100 Elk Grove Village, United States, ASN53340 (FIBERHUB - VegasNAP, LLC, US),
Reverse DNS
writing-count.timedrought.com
Software
Apache /
Resource Hash
1bcda772b32139bbd18696ba5a08fc2da9731cecf88d6b904cb953107484f55f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mypayment-disputed.servehttp.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Cookie
PHPSESSID=pif63v0b976fheo592shovil86
Connection
keep-alive
Cache-Control
no-cache
Referer
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Sat, 18 Nov 2017 22:42:08 GMT
Last-Modified
Sat, 18 Nov 2017 22:42:07 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
13106
jquery.js
mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/js/ Frame 2553
84 KB
84 KB
Script
General
Full URL
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/js/jquery.js
Requested by
Host: mypayment-disputed.servehttp.com
URL: https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.241.138.100 Elk Grove Village, United States, ASN53340 (FIBERHUB - VegasNAP, LLC, US),
Reverse DNS
writing-count.timedrought.com
Software
Apache /
Resource Hash
2a1f1370eb7b24a307312112427dfd544fb838a8bef66babc936f5e870a22e52

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mypayment-disputed.servehttp.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
*/*
Referer
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Cookie
PHPSESSID=pif63v0b976fheo592shovil86
Connection
keep-alive
Cache-Control
no-cache
Referer
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Sat, 18 Nov 2017 22:42:08 GMT
Last-Modified
Sat, 18 Nov 2017 22:42:07 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
86343
kl_h4aXX6987PO.svg
mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/img/ Frame 2553
5 KB
5 KB
Image
General
Full URL
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/img/kl_h4aXX6987PO.svg
Requested by
Host: mypayment-disputed.servehttp.com
URL: https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.241.138.100 Elk Grove Village, United States, ASN53340 (FIBERHUB - VegasNAP, LLC, US),
Reverse DNS
writing-count.timedrought.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
mypayment-disputed.servehttp.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/css/L-Z118.css
Cookie
PHPSESSID=pif63v0b976fheo592shovil86
Connection
keep-alive
Cache-Control
no-cache
Referer
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/lib/css/L-Z118.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Response headers

Date
Sat, 18 Nov 2017 22:42:09 GMT
Last-Modified
Sat, 18 Nov 2017 22:42:07 GMT
Server
Apache
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
4945

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
mypayment-disputed.servehttp.com
URL
https://mypayment-disputed.servehttp.com/myaccount/signin/customer_center/customer-IDPP00C547/myaccount/signin/?country.x=DE&locale.x=en_DE

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery object| arr object| l number| i

1 Cookies

Domain/Path Name / Value
mypayment-disputed.servehttp.com/ Name: PHPSESSID
Value: pif63v0b976fheo592shovil86

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block