uscmobile.cloudns.be Open in urlscan Pro
142.202.189.100  Malicious Activity! Public Scan

Submitted URL: http://uscmobile.cloudns.be/
Effective URL: https://uscmobile.cloudns.be/
Submission: On June 28 via manual from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 142.202.189.100, located in Chandler, United States and belongs to DYNU, US. The main domain is uscmobile.cloudns.be.
TLS certificate: Issued by R10 on June 23rd 2024. Valid for: 3 months.
This is the only time uscmobile.cloudns.be was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Community Verdicts: Malicious1 votes Show Verdicts

Domain & IP information

IP Address AS Autonomous System
2 142.202.189.100 398019 (DYNU)
2 1
Apex Domain
Subdomains
Transfer
2 cloudns.be
uscmobile.cloudns.be
1 KB
2 1
Domain Requested by
2 uscmobile.cloudns.be
2 1

This site contains no links.

Subject Issuer Validity Valid
mail.communication.mysynology.net
R10
2024-06-23 -
2024-09-21
3 months crt.sh

This page contains 1 frames:

Primary Page: https://uscmobile.cloudns.be/
Frame ID: 6CA4FA71C382288C71F4C4CC69007F40
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Index of /

Page URL History Show full URLs

  1. http://uscmobile.cloudns.be/ HTTP 307
    https://uscmobile.cloudns.be/ Page URL

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://uscmobile.cloudns.be/ HTTP 307
    https://uscmobile.cloudns.be/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
uscmobile.cloudns.be/
Redirect Chain
  • http://uscmobile.cloudns.be/
  • https://uscmobile.cloudns.be/
447 B
640 B
Document
General
Full URL
https://uscmobile.cloudns.be/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
142.202.189.100 Chandler, United States, ASN398019 (DYNU, US),
Reverse DNS
monbt.bumbleshrimp.com
Software
Apache /
Resource Hash
4bce352eed116a0e8bb6edcf4ffbbbac8bdc89d8a2d1bd08c3db806bf7e54a71

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Length
447
Content-Type
text/html;charset=ISO-8859-1
Date
Fri, 28 Jun 2024 18:59:40 GMT
Keep-Alive
timeout=5, max=100
Server
Apache

Redirect headers

Location
https://uscmobile.cloudns.be/
Non-Authoritative-Reason
HttpsUpgrades
favicon.ico
uscmobile.cloudns.be/
315 B
515 B
Other
General
Full URL
https://uscmobile.cloudns.be/favicon.ico
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
142.202.189.100 Chandler, United States, ASN398019 (DYNU, US),
Reverse DNS
monbt.bumbleshrimp.com
Software
Apache /
Resource Hash
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

Request headers

sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
Referer
https://uscmobile.cloudns.be/
Accept-Language
de-DE,de;q=0.9;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

Date
Fri, 28 Jun 2024 18:59:40 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
315
Content-Type
text/html; charset=iso-8859-1

Verdicts & Comments Add Verdict or Comment


Malicious page.url
Submitted on June 28th 2024, 7:05:27 pm UTC — From United States

Threats: Phishkit Phishing Social Engineering
Brands: US Cellular US Netflix US
Comment: This site more specifically the backend server is hosting a Phishing kit that is be sold, used and rebranded to attack multiple business and their customers. The backend server has been consistent but they keep changing the domain. They are using cpanel to automate the building of these servers.

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence object| sharedStorage

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://uscmobile.cloudns.be/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

uscmobile.cloudns.be
142.202.189.100
4bce352eed116a0e8bb6edcf4ffbbbac8bdc89d8a2d1bd08c3db806bf7e54a71
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3