u699293nrh.ha004.t.justns.ru Open in urlscan Pro
2a00:b700::23  Malicious Activity! Public Scan

Submitted URL: http://droujdi.vot.pl/d8e.html?Dear
Effective URL: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy...
Submission: On April 22 via manual from ES

Summary

This website contacted 2 IPs in 3 countries across 3 domains to perform 7 HTTP transactions. The main IP is 2a00:b700::23, located in Russian Federation and belongs to ASBAXET, RU. The main domain is u699293nrh.ha004.t.justns.ru.
This is the only time u699293nrh.ha004.t.justns.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Caixabank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 195.78.66.116 41079 (SUPERHOST...)
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
6 2a00:b700::23 51659 (ASBAXET)
7 2
Apex Domain
Subdomains
Transfer
6 justns.ru
u699293nrh.ha004.t.justns.ru
50 KB
1 tny.sh
tny.sh
319 B
1 vot.pl
droujdi.vot.pl
358 B
7 3
Domain Requested by
6 u699293nrh.ha004.t.justns.ru u699293nrh.ha004.t.justns.ru
1 tny.sh 1 redirects
1 droujdi.vot.pl
7 3

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
Frame ID: 855AC679A4B03D901D6220AA5D183FE5
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://droujdi.vot.pl/d8e.html?Dear Page URL
  2. https://tny.sh/p9m1BNQ HTTP 302
    http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/ Page URL
  3. http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLj... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

7
Requests

0 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

2
IPs

3
Countries

51 kB
Transfer

53 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://droujdi.vot.pl/d8e.html?Dear Page URL
  2. https://tny.sh/p9m1BNQ HTTP 302
    http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/ Page URL
  3. http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://tny.sh/p9m1BNQ HTTP 302
  • http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
d8e.html
droujdi.vot.pl/
87 B
358 B
Document
General
Full URL
http://droujdi.vot.pl/d8e.html?Dear
Protocol
HTTP/1.1
Server
195.78.66.116 , Poland, ASN41079 (SUPERHOST-PL-AS, PL),
Reverse DNS
s110.linuxpl.com
Software
LiteSpeed /
Resource Hash

Request headers

Host
droujdi.vot.pl
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Type
text/html
Last-Modified
Wed, 22 Apr 2020 07:22:15 GMT
Etag
"57-5e9ff0a7-582ec142fde6d698;;;"
Accept-Ranges
bytes
Content-Length
87
Date
Wed, 22 Apr 2020 11:56:43 GMT
Server
LiteSpeed
Vary
User-Agent
/
u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
Redirect Chain
  • https://tny.sh/p9m1BNQ
  • http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
311 B
485 B
Document
General
Full URL
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
Protocol
HTTP/1.1
Server
2a00:b700::23 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
1b1231cac2a976df1cd8a046a6d372a917f1fe479d9969435df2d52d04610b2d

Request headers

Host
u699293nrh.ha004.t.justns.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://droujdi.vot.pl/d8e.html?Dear
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://droujdi.vot.pl/d8e.html?Dear

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Content-Length
267
Content-Encoding
gzip
Vary
Accept-Encoding,User-Agent
Date
Wed, 22 Apr 2020 11:56:43 GMT
Server
LiteSpeed

Redirect headers

status
302
date
Wed, 22 Apr 2020 11:56:43 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=dc8f9a7662050ce8a3e3383924408066f1587556603; expires=Fri, 22-May-20 11:56:43 GMT; path=/; domain=.tny.sh; HttpOnly; SameSite=Lax; Secure connect.sid=s%3AEDBiTYyyvlG5Haat3eQIMsh6CnkxVUYE.lk67MBQJULNclT7kcA9%2BpQelbaoYPpKSsCCbPbFtrGE; Path=/; Expires=Wed, 29 Apr 2020 11:56:43 GMT; HttpOnly
x-dns-prefetch-control
off
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains
x-download-options
noopen
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-robots-tag
none
location
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
vary
Accept, Accept-Encoding
via
1.1 vegur
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
587f29c25d8adfa5-FRA
cf-request-id
0243586d760000dfa59f1c2200000001
Primary Request indx.php
u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
4 KB
2 KB
Document
General
Full URL
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
Requested by
Host: u699293nrh.ha004.t.justns.ru
URL: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
Protocol
HTTP/1.1
Server
2a00:b700::23 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
ded0ca432b45e5ecb5a99a947b47aa87116bd5b7163ee82ef3c528b94b761462

Request headers

Host
u699293nrh.ha004.t.justns.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Content-Length
1350
Content-Encoding
gzip
Vary
Accept-Encoding,User-Agent
Date
Wed, 22 Apr 2020 11:56:43 GMT
Server
LiteSpeed
css.css
u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/
3 KB
1 KB
Stylesheet
General
Full URL
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/css.css
Requested by
Host: u699293nrh.ha004.t.justns.ru
URL: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
Protocol
HTTP/1.1
Server
2a00:b700::23 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
7d6b4f8bf034e5d45d138adea5d87ecd80e845042827f00fe5ae702752a0acea

Request headers

Referer
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 22 Apr 2020 11:56:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Oct 2018 10:57:00 GMT
Server
LiteSpeed
Etag
"c4d-5bbddafc-31e861490a3983c0;gz"
Vary
Accept-Encoding,User-Agent
Content-Type
text/css
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
755
Expires
Wed, 29 Apr 2020 11:56:43 GMT
S1.png
u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/
1 KB
1 KB
Image
General
Full URL
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/S1.png
Requested by
Host: u699293nrh.ha004.t.justns.ru
URL: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
Protocol
HTTP/1.1
Server
2a00:b700::23 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
a82f39b7c61a89e5c1ae39927740a0d69caa5f08c53514e5ccc0dd085056ee9a

Request headers

Referer
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 22 Apr 2020 11:56:43 GMT
Last-Modified
Thu, 04 Oct 2018 13:48:34 GMT
Server
LiteSpeed
Etag
"477-5bb61a32-fe9c691b82d685a1;;;"
Vary
User-Agent
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1143
Expires
Wed, 29 Apr 2020 11:56:43 GMT
B1.png
u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/
44 KB
44 KB
Image
General
Full URL
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/B1.png
Requested by
Host: u699293nrh.ha004.t.justns.ru
URL: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
Protocol
HTTP/1.1
Server
2a00:b700::23 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
be71a203a44c27cd9aede82cda977505755f47133ec5a453d8ba9e3f9d213bb5

Request headers

Referer
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/css.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 22 Apr 2020 11:56:43 GMT
Last-Modified
Tue, 09 Oct 2018 14:14:54 GMT
Server
LiteSpeed
Etag
"afa9-5bbcb7de-23909cb15232834e;;;"
Vary
User-Agent
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
44969
Expires
Wed, 29 Apr 2020 11:56:43 GMT
select.png
u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/
1 KB
1 KB
Image
General
Full URL
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/select.png
Requested by
Host: u699293nrh.ha004.t.justns.ru
URL: http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/bagara/indx.php?gUFVCTElDICItLy9XM0MvL0RURCBYSFRNTCAxLjAgVHJhbnNpdGlvbmFsLy9FTiIgImh0dHA6Ly93d3cudzMub3JnL1RSL3hodG1sMS9EVEQveGh0bWwxLXRyYW5zaXRpb25hbC5kdGQiPg0KPGh0bWwgeG1sbnM9Imh0dHA6Ly93d3&ug=cudzMub3JnLzE5OTkveGh0bWwiPg0KICAgIDxoZWFkPg0KICAgICAgICA8dGl0bGU+IEFwcGxlIC0gQ29uZ
Protocol
HTTP/1.1
Server
2a00:b700::23 , Russian Federation, ASN51659 (ASBAXET, RU),
Reverse DNS
Software
LiteSpeed /
Resource Hash
bddf439e633171c894f60cf44c191122764d3583469cc12abc34c4fa76623466

Request headers

Referer
http://u699293nrh.ha004.t.justns.ru/caID815601/AToo80465/img/css.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 22 Apr 2020 11:56:43 GMT
Last-Modified
Thu, 04 Oct 2018 12:47:34 GMT
Server
LiteSpeed
Etag
"43f-5bb60be6-7847f4dd6d9301ac;;;"
Vary
User-Agent
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1087
Expires
Wed, 29 Apr 2020 11:56:43 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Caixabank (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| karimo

0 Cookies