lsfpareparts.com Open in urlscan Pro
107.175.94.154  Malicious Activity! Public Scan

Submitted URL: https://redirect.viglink.com/?u=http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D&&cuid=prkk1...
Effective URL: https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/?newsid=6...
Submission: On December 12 via manual from NL

Summary

This website contacted 2 IPs in 3 countries across 3 domains to perform 3 HTTP transactions. The main IP is 107.175.94.154, located in Buffalo, United States and belongs to AS-COLOCROSSING - ColoCrossing, US. The main domain is lsfpareparts.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on December 9th 2019. Valid for: 3 months.
This is the only time lsfpareparts.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 34.250.144.26 16509 (AMAZON-02)
1 1 81.221.254.6 1836 (GREEN gre...)
3 107.175.94.154 36352 (AS-COLOCR...)
3 2
Apex Domain
Subdomains
Transfer
3 lsfpareparts.com
lsfpareparts.com
843 KB
1 ryfcad.ch
www.ryfcad.ch
552 B
1 viglink.com
redirect.viglink.com
532 B
3 3
Domain Requested by
3 lsfpareparts.com lsfpareparts.com
1 www.ryfcad.ch 1 redirects
1 redirect.viglink.com 1 redirects
3 3

This site contains no links.

Subject Issuer Validity Valid
lsfpareparts.com
cPanel, Inc. Certification Authority
2019-12-09 -
2020-03-08
3 months crt.sh

This page contains 1 frames:

Primary Page: https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/?newsid=6291279677NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&email=687573616D614073616269632E636F6D&loginpage=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&reff=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=
Frame ID: C8409D2FAAAC84483D2DF5BDD4CCD374
Requests: 8 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://redirect.viglink.com/?u=http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D61407361626963... HTTP 302
    http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D HTTP 302
    https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYik... Page URL
  2. https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

3
Countries

843 kB
Transfer

859 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://redirect.viglink.com/?u=http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D&&cuid=prkk1fswmpz&key=fd5de1d096b38be9fffd6ddc1948df4f HTTP 302
    http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D HTTP 302
    https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv& Page URL
  2. https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/?newsid=6291279677NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&email=687573616D614073616269632E636F6D&loginpage=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&reff=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://redirect.viglink.com/?u=http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D&&cuid=prkk1fswmpz&key=fd5de1d096b38be9fffd6ddc1948df4f HTTP 302
  • http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D HTTP 302
  • https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv&

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
lsfpareparts.com/.usage_analysis/
Redirect Chain
  • https://redirect.viglink.com/?u=http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D&&cuid=prkk1fswmpz&key=fd5de1d096b38be9fffd6ddc1948df4f
  • http://www.ryfcad.ch//.0965@098/.0965@098/?pzone=687573616D614073616269632E636F6D
  • https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D6140736162696...
507 B
715 B
Document
General
Full URL
https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv&
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.175.94.154 Buffalo, United States, ASN36352 (AS-COLOCROSSING - ColoCrossing, US),
Reverse DNS
107-175-94-154-host.colocrossing.com
Software
Apache /
Resource Hash

Request headers

Host
lsfpareparts.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

Date
Thu, 12 Dec 2019 19:46:34 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Content-Type
text/html; charset=UTF-8
Location
https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv&
Server
Microsoft-IIS/8.5
X-Powered-By
PHP/5.6.0 ASP.NET
Date
Thu, 12 Dec 2019 19:46:32 GMT
Content-Length
468
Primary Request /
lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/
48 KB
48 KB
Document
General
Full URL
https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/?newsid=6291279677NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&email=687573616D614073616269632E636F6D&loginpage=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&reff=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=
Requested by
Host: lsfpareparts.com
URL: https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv&
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.175.94.154 Buffalo, United States, ASN36352 (AS-COLOCROSSING - ColoCrossing, US),
Reverse DNS
107-175-94-154-host.colocrossing.com
Software
Apache /
Resource Hash
3ff2ad107a277315ea004979b7644a9f13ea9449103b48b426b57d562193b517

Request headers

Host
lsfpareparts.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
same-origin
Sec-Fetch-Mode
navigate
Referer
https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv&
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://lsfpareparts.com/.usage_analysis/?TW6j14CG2VqQ5Fvd7mlcI8rPRzDOASBJXwgsELKy0a9ephbHtoUZM3nNYikfxu=p8HTWOE13Ai5wZfcP4jvLu9YVXlGnbCh2Fyrot0BRmK6DJxgUzskMNd7aeQSqI&email=687573616D614073616269632E636F6D&4GQfJib7FOrPXBD3q8K5L1y9mtZN02oszcCvapYlRxkMwu6UnIdSheTjAgVWEH=FA6j4KiJnT0gVkCoHdMtfURNYE2hWpa3IcOD5surZBPbelqzxLGmy1X7wQ89Sv&

Response headers

Date
Thu, 12 Dec 2019 19:46:34 GMT
Server
Apache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
css.png
lsfpareparts.com/.usage_analysis/src/image/
795 KB
795 KB
Image
General
Full URL
https://lsfpareparts.com/.usage_analysis/src/image/css.png
Requested by
Host: lsfpareparts.com
URL: https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/?newsid=6291279677NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&email=687573616D614073616269632E636F6D&loginpage=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&reff=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.175.94.154 Buffalo, United States, ASN36352 (AS-COLOCROSSING - ColoCrossing, US),
Reverse DNS
107-175-94-154-host.colocrossing.com
Software
Apache /
Resource Hash
4757275e3c5c77d3def35e4cfee57434bb11c913a101b7ee99d9ac77567841b3

Request headers

Referer
https://lsfpareparts.com/.usage_analysis/owa.system.webmai.login.oauthy.access=d20e6088a98eddee7b8fd5f87e9b4266/?newsid=6291279677NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&email=687573616D614073616269632E636F6D&loginpage=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=&reff=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=NTU3YjZiYzU1MGUxNjVlYTBiZTFhNTAwM2E4M2IzMDk=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 12 Dec 2019 19:46:35 GMT
Last-Modified
Tue, 03 Dec 2019 09:23:50 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
813764
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate number| g_fFcs

0 Cookies