www.alhaya.news
Open in
urlscan Pro
216.127.167.24
Malicious Activity!
Public Scan
Submission: On May 22 via automatic, source openphish
Summary
This is the only time www.alhaya.news was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 216.127.167.24 216.127.167.24 | 35916 () () | |
2 | 111.65.230.87 111.65.230.87 | 56030 (VOYAGERNE...) (VOYAGERNET-AS-AP Voyager Internet Ltd.) | |
7 | 2 |
ASN35916 (,)
PTR: layan.egytrust.com
www.alhaya.news | |
alhaya.news |
ASN56030 (VOYAGERNET-AS-AP Voyager Internet Ltd., NZ)
webmail.1stdomains.co.nz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
alhaya.news
1 redirects
www.alhaya.news alhaya.news |
102 KB |
2 |
1stdomains.co.nz
webmail.1stdomains.co.nz |
34 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
5 | www.alhaya.news |
1 redirects
www.alhaya.news
|
2 | webmail.1stdomains.co.nz |
www.alhaya.news
|
1 | alhaya.news |
www.alhaya.news
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmail.1stdomains.co.nz RapidSSL RSA CA 2018 |
2017-12-06 - 2020-02-04 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.alhaya.news/Mailbox/Mailbox/webmail.php
Frame ID: 0E1A0CE127315EFE6923F5AD5AC9D728
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- http://www.alhaya.news/Mailbox/Mailbox/WebMail%20Sign%20In_files/images/overlay.png HTTP 301
- http://alhaya.news/Mailbox/Mailbox/WebMail%20Sign%20In_files/images/overlay.png
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
webmail.php
www.alhaya.news/Mailbox/Mailbox/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
www.alhaya.news/Mailbox/Mailbox/WebMail%20Sign%20In_files/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
www.alhaya.news/Mailbox/Mailbox/WebMail%20Sign%20In_files/ |
92 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.png
www.alhaya.news/Mailbox/Mailbox/WebMail%20Sign%20In_files/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backer.png
webmail.1stdomains.co.nz/images/ |
207 B 416 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-graphic2.png
webmail.1stdomains.co.nz/images/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
overlay.png
alhaya.news/Mailbox/Mailbox/WebMail%20Sign%20In_files/images/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| check_all function| do_focus function| do_select function| username_focus function| username_blur function| change_pw_field0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
alhaya.news
webmail.1stdomains.co.nz
www.alhaya.news
111.65.230.87
216.127.167.24
472ec0f2d6895da7a6f90ab2d0e55c21e6c7b647228278c069f526ce29617ca4
56f80d693b8c4cf32e38c041762970e4a20107150e728f1d98e1625c22798fcf
742e7bb7563b0a36886bdebf6cf171e098f38878b6b631bb65b87fc80932f45f
7d22fc6e20da0f809cedc5a0ad2aace4d1b44a242b4a62429af342bb9c86afa5
8c2910972d4fe1b29769dad2df16b75f76f8a52a33bf3140953d8874e8b51511
de5b72fca3049d8ff4e171a950b62a241a1fc3947013881e2fad76e5ddc1a7c1
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855