intrahelha.helha.be
Open in
urlscan Pro
193.190.66.7
Malicious Activity!
Public Scan
Submission: On June 14 via api from IE
Summary
TLS certificate: Issued by GEANT OV RSA CA 4 on April 26th 2020. Valid for: 2 years.
This is the only time intrahelha.helha.be was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: UPS (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 193.190.66.7 193.190.66.7 | 2611 (BELNET) (BELNET) | |
1 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.75.89.177 104.75.89.177 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 3 |
ASN16625 (AKAMAI-AS, US)
PTR: a104-75-89-177.deploy.static.akamaitechnologies.com
www.ups.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
helha.be
intrahelha.helha.be |
71 KB |
1 |
ups.com
www.ups.com |
2 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
3 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | intrahelha.helha.be |
intrahelha.helha.be
|
1 | www.ups.com |
intrahelha.helha.be
|
1 | cdnjs.cloudflare.com |
intrahelha.helha.be
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.helha.be GEANT OV RSA CA 4 |
2020-04-26 - 2022-04-26 |
2 years | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
www.ups.com COMODO RSA Organization Validation Secure Server CA |
2020-05-29 - 2022-05-29 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://intrahelha.helha.be/wp-includes/widgets/ups.cn/7fad3646c428b42/payment.php?payment
Frame ID: 798942EAEC33A61A2927DAD55B6CDF4F
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
payment.php
intrahelha.helha.be/wp-includes/widgets/ups.cn/7fad3646c428b42/ |
18 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
intrahelha.helha.be/wp-includes/widgets/ups.cn/assets/css/ |
124 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
intrahelha.helha.be/wp-includes/widgets/ups.cn/assets/css/ |
16 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.0.min.js
intrahelha.helha.be/wp-includes/widgets/ups.cn/assets/js/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
UPS_logo.svg
www.ups.com/assets/resources/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rp.png
intrahelha.helha.be/wp-includes/widgets/ups.cn/assets/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cccc.png
intrahelha.helha.be/wp-includes/widgets/ups.cn/assets/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypt.png
intrahelha.helha.be/wp-includes/widgets/ups.cn/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: UPS (Transportation)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| type_carte function| handleExpInput1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
intrahelha.helha.be/ | Name: PHPSESSID Value: 3c8a6d8qpicuf536hk4rg5skn2 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15768000 |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
intrahelha.helha.be
www.ups.com
104.75.89.177
193.190.66.7
2606:4700::6810:125e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