66.42.107.233
Open in
urlscan Pro
66.42.107.233
Malicious Activity!
Public Scan
Effective URL: http://66.42.107.233/login.html
Submission: On October 28 via manual from US
Summary
This is the only time 66.42.107.233 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telekom (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 66.42.107.233 66.42.107.233 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 144.208.125.37 144.208.125.37 | 395092 (SHOCK-1) (SHOCK-1) | |
10 | 2 |
ASN20473 (AS-CHOOPA, US)
PTR: 66.42.107.233.vultr.com
66.42.107.233 |
ASN395092 (SHOCK-1, US)
PTR: nj-s5.dedicatedpanel.net
cdnjs.cloudmetro.com-en.bid |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
com-en.bid
cdnjs.cloudmetro.com-en.bid |
301 B |
10 | 1 |
Domain | Requested by | |
---|---|---|
1 | cdnjs.cloudmetro.com-en.bid |
66.42.107.233
|
10 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
passwordreset.t-mobile.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://66.42.107.233/login.html
Frame ID: 54344FC1B723B7CA7A8D4EED5ACF0DCC
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://66.42.107.233/
HTTP 302
http://66.42.107.233/login.html Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Windows Server (Operating Systems) Expand
Detected patterns
- headers server /Win32|Win64/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Click here to reset your password.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://66.42.107.233/
HTTP 302
http://66.42.107.233/login.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.html
66.42.107.233/ Redirect Chain
|
15 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
66.42.107.233/assets/ |
698 KB 698 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipbox.css
66.42.107.233/assets/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipbox2.css
66.42.107.233/assets/ |
15 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-modal.min.js
cdnjs.cloudmetro.com-en.bid/libraries/ |
17 B 301 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TMobile_Background_Web.jpg
66.42.107.233/assets/ |
115 KB 116 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
citrixsans_regular.woff
66.42.107.233/assets/assets/fonts/citrix_sans/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
citrixsans_semibold.woff
66.42.107.233/assets/assets/fonts/citrix_sans/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
citrixsans_regular.ttf
66.42.107.233/assets/assets/fonts/citrix_sans/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
citrixsans_semibold.ttf
66.42.107.233/assets/assets/fonts/citrix_sans/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telekom (Telecommunication)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudmetro.com-en.bid
144.208.125.37
66.42.107.233
1865d69ce806382f2a71b12508cabaca8f17d39548aa7d1cfeac04f478b26eaf
217e720f67335c49f8961d5a7f3921cf716b05b0af4a32f61908e6755d63b677
6bd21fdd6cecc2b4c3c546c381f2d7f64eb068ae7cb0a1ac6f8b0e26278109be
98bef494ae48d0cacc902b3b5fac4414424fb4b3bc8ea3c908f83f427f54503b
bff343ff30e57fe17dfdea73701f2edf2448f3f30400ca818a1971459a023d25
ee96581381cd6b5cafefb9f2d2cc77be78d7e769c9fcd7aa083468e43087ba93