hostsxdgo.sheikh.asia
Open in
urlscan Pro
139.59.255.208
Malicious Activity!
Public Scan
Effective URL: https://hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/PS-612aac5e3a416
Submission: On August 28 via manual from US
Summary
TLS certificate: Issued by R3 on August 27th 2021. Valid for: 3 months.
This is the only time hostsxdgo.sheikh.asia was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 139.59.255.208 139.59.255.208 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
10 | 1 |
ASN14061 (DIGITALOCEAN-ASN, US)
west.farazbamgostar.com | |
hostsxdgo.sheikh.asia |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
sheikh.asia
1 redirects
hostsxdgo.sheikh.asia |
362 KB |
1 |
farazbamgostar.com
west.farazbamgostar.com |
22 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
10 | hostsxdgo.sheikh.asia |
1 redirects
west.farazbamgostar.com
hostsxdgo.sheikh.asia |
1 | west.farazbamgostar.com | |
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
hostsxdgo.sheikh.asia R3 |
2021-08-27 - 2021-11-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/PS-612aac5e3a416
Frame ID: A914FA71DA9FEFA7EFB4D2496EAA1DE7
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
1EA687D6A9F7B6575E87F30892EB1099612AAC5E732E8Page URL History Show full URLs
- http://west.farazbamgostar.com/yxnoaxnolmdvbhdhbgthckbzzxrpbmrpys5jb20 Page URL
-
https://hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/$yxnoaxnolmdvbhdhbgthckbzzxrpb...
HTTP 302
https://hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/PS-612aac5e3a416 Page URL
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://west.farazbamgostar.com/yxnoaxnolmdvbhdhbgthckbzzxrpbmrpys5jb20 Page URL
-
https://hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/$yxnoaxnolmdvbhdhbgthckbzzxrpbmrpys5jb20
HTTP 302
https://hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/PS-612aac5e3a416 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
yxnoaxnolmdvbhdhbgthckbzzxrpbmrpys5jb20
west.farazbamgostar.com/ |
22 KB 22 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
PS-612aac5e3a416
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/ Redirect Chain
|
44 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3e067f56a9b88902d81b6a951e1292a77fcea685e77e3
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/APP-U04HWG/ |
103 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1bf80e5ee796260b273f95d587126a791a73ec86a9a8e
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/o/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
716637e71e922abe6d9e1c0b78a305e97a55faf268988
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/e/ |
513 B 635 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3569e2e28579fe1b7898e7e89a10c732a06a76b5d1a6f
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/jq/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b771ac6ea9df75a1627983f85a862e29b95708036e1ee
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/boot/ |
50 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7e1886a76605e1f2398a5b7c29f0d7a729a5ee893be61
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/jm/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
api-ae7667f755018978bba1e0d231287ea3ee9982695fa6c
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
api-f922a7e58f927e166a61850687739bab3a1ece9e50d87
hostsxdgo.sheikh.asia/petPLbn2xaK6NjnTzhuKJgMtz73FNOoKnZrjmYOgqW9i2/ |
299 KB 290 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| bootstrap string| email string| url function| sleep1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
hostsxdgo.sheikh.asia/ | Name: PHPSESSID Value: 85bikutuk22lc45ufq0kjpf2vp |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hostsxdgo.sheikh.asia
west.farazbamgostar.com
139.59.255.208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