URL: http://promocoesmglu.com/545454SSiiDDDDD_55/index.php?&id=14
Submission: On July 12 via automatic , source phishtank

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 177.55.116.74, located in Brazil and belongs to RedeHost Internet Ltda., BR. The main domain is promocoesmglu.com.
This is the first time this domain was scanned on urlscan.io!

Verdict: Malicious (Score: 10/100) Show Details

  • urlscan - Score: 0
  • phishtank - Score: 10 (URL submitted from phishtank) -
    phishing

Domain & IP information

IP Address AS Autonomous System
1 177.55.116.74 53057 (RedeHost ...)
1 1
Domain
Subdomains
Transfer
1 promocoesmglu.com
734 B
1 1
Domain Requested by
1 promocoesmglu.com
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set index.php?&id=14
/545454SSiiDDDDD_55
145 B
734 B
Document
General
Full URL
http://promocoesmglu.com/545454SSiiDDDDD_55/index.php?&id=14
Protocol
HTTP/1.1
Server
177.55.116.74 , Brazil, ASN53057 (RedeHost Internet Ltda., BR),
Reverse DNS
Software
Apache / PHP/5.6.30
Resource Hash
ddce7665ac26d64d19623432ba88917f9ef9133f2868bd9bce44d98666174c8d

Request headers

Host
promocoesmglu.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 12 Jul 2019 02:18:06 GMT
Server
Apache
X-Powered-By
PHP/5.6.30
Expires
Thu, 19 Nov 1981 08:52:00 GMT Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0 max-age=0, no-cache, no-store, must-revalidate
Pragma
no-cache no-cache
Set-Cookie
PHPSESSID=fsvomaau9llctsai3kvvmadis7; path=/
Vary
Accept-Encoding
Content-Encoding
gzip
Accept-Ranges
none
Content-Length
135
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
promocoesmglu.com/ Name: PHPSESSID
Value: fsvomaau9llctsai3kvvmadis7

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

promocoesmglu.com


177.55.116.74

ddce7665ac26d64d19623432ba88917f9ef9133f2868bd9bce44d98666174c8d