Submitted URL: http://chempsm.com/ddhezzsn
Effective URL: http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Submission: On November 09 via api from US

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 169.1.24.161, located in South Africa and belongs to Afrihost, ZA. The main domain is ixiaizn.uk.
This is the only time ixiaizn.uk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online) American Express (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 210.16.102.26 40676 (AS40676)
2 6 169.1.24.161 37611 (Afrihost)
4 1
Apex Domain
Subdomains
Transfer
6 ixiaizn.uk
ixiaizn.uk
326 KB
1 chempsm.com
chempsm.com
306 B
4 2
Domain Requested by
6 ixiaizn.uk 2 redirects ixiaizn.uk
1 chempsm.com 1 redirects
4 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Frame ID: 9445150FC5B9842F80E20D4F9E0EE7A7
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://chempsm.com/ddhezzsn HTTP 301
    http://ixiaizn.uk/amiro HTTP 301
    http://ixiaizn.uk/amiro/ HTTP 302
    http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

326 kB
Transfer

325 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://chempsm.com/ddhezzsn HTTP 301
    http://ixiaizn.uk/amiro HTTP 301
    http://ixiaizn.uk/amiro/ HTTP 302
    http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
ixiaizn.uk/amiro/
Redirect Chain
  • http://chempsm.com/ddhezzsn
  • http://ixiaizn.uk/amiro
  • http://ixiaizn.uk/amiro/
  • http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
4 KB
4 KB
Document
General
Full URL
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Protocol
HTTP/1.1
Server
169.1.24.161 , South Africa, ASN37611 (Afrihost, ZA),
Reverse DNS
vewhale.hosted.co.za
Software
Apache /
Resource Hash
7b965d1f1e99ba5d95abca1e8f090ac0c13b51807b6670c5f6279dc70a6b754b

Request headers

Host
ixiaizn.uk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 09 Nov 2018 08:14:33 GMT
Server
Apache
Keep-Alive
timeout=1, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Fri, 09 Nov 2018 08:14:32 GMT
Server
Apache
Location
login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Content-Length
0
Keep-Alive
timeout=1, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
MaskedPassword.js
ixiaizn.uk/amiro/login_files/
17 KB
17 KB
Script
General
Full URL
http://ixiaizn.uk/amiro/login_files/MaskedPassword.js
Requested by
Host: ixiaizn.uk
URL: http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Protocol
HTTP/1.1
Server
169.1.24.161 , South Africa, ASN37611 (Afrihost, ZA),
Reverse DNS
vewhale.hosted.co.za
Software
Apache /
Resource Hash
2cfdb08c07395b0be65df154f068ade61c1bfad7e3e3e2d0e40b85319fa95825

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
ixiaizn.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 09 Nov 2018 08:14:33 GMT
Last-Modified
Sat, 16 Dec 2017 05:46:12 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=97
Content-Length
16904
rsz_2016-05-17_162745.png
ixiaizn.uk/amiro/login_files/
303 KB
304 KB
Image
General
Full URL
http://ixiaizn.uk/amiro/login_files/rsz_2016-05-17_162745.png
Requested by
Host: ixiaizn.uk
URL: http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Protocol
HTTP/1.1
Server
169.1.24.161 , South Africa, ASN37611 (Afrihost, ZA),
Reverse DNS
vewhale.hosted.co.za
Software
Apache /
Resource Hash
68187aeaa19dad775e2c6970e8310e206465a5a3a3b8abce43ab8663a4109659

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
ixiaizn.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 09 Nov 2018 08:14:33 GMT
Last-Modified
Mon, 27 Mar 2017 08:05:52 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=100
Content-Length
310710
2015-01-28_200415.png
ixiaizn.uk/amiro/login_files/
1 KB
1 KB
Image
General
Full URL
http://ixiaizn.uk/amiro/login_files/2015-01-28_200415.png
Requested by
Host: ixiaizn.uk
URL: http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Protocol
HTTP/1.1
Server
169.1.24.161 , South Africa, ASN37611 (Afrihost, ZA),
Reverse DNS
vewhale.hosted.co.za
Software
Apache /
Resource Hash
df1769d599e041d8b49ef89fc0acbed2d04c4ab004d64f4acbbb3e61e46b530e

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
ixiaizn.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://ixiaizn.uk/amiro/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 09 Nov 2018 08:14:33 GMT
Last-Modified
Mon, 27 Mar 2017 08:04:06 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=96
Content-Length
1193

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online) American Express (Financial)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| MaskedPassword

0 Cookies