URL: http://gbellelectric.com/images/upload/ok_file/sinocayala%20auto/99f2259e8fb23557dbafc3c0a6d12242/2c08a452/signOnV2Screen.php?email=
Submission: On January 11 via automatic , source phishtank

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 107.180.44.133, located in Scottsdale, United States and belongs to AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US. The main domain is gbellelectric.com.
This is the first time this domain was scanned on urlscan.io!
Potentially malicious content or behaviour on this page! Show Details

Domain & IP information

IP Address AS Autonomous System
1 107.180.44.133 26496 (AS-26496-...)
1 1
Domain
Subdomains
Transfer
1 gbellelectric.com
402 B
1 1
Domain Requested by
1 gbellelectric.com
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set signOnV2Screen.php?email=
/images/upload/ok_file/sinocayala%20auto/99f2259e8fb23557dbafc3c0a6d12242/2c08a452
0
402 B
Document
General
Full URL
http://gbellelectric.com/images/upload/ok_file/sinocayala%20auto/99f2259e8fb23557dbafc3c0a6d12242/2c08a452/signOnV2Screen.php?email=
Protocol
HTTP/1.1
Server
107.180.44.133 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US),
Reverse DNS
ip-107-180-44-133.ip.secureserver.net
Software
Apache / PHP/5.4.45
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Host
gbellelectric.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 11 Jan 2019 19:23:10 GMT
Server
Apache
X-Powered-By
PHP/5.4.45
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Set-Cookie
PHPSESSID=v7otrpfpgmu7ekjueea8483d92; path=/
Vary
User-Agent
Content-Length
0
Keep-Alive
timeout=5
Connection
Keep-Alive
Content-Type
text/html

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Malicious behaviour and content

Google Safe Browsing

There was 1 malicious URLs contacted according to Google Safe Browsing! See report

SOCIAL_ENGINEERING http://gbellelectric.com/images/upload/ok_file/sinocayala%20auto/99f2259e8fb23557dbafc3c0a6d12242/2c08a452/signOnV2Screen.php?email=

Phishtank submission Was submitted from known phishing list

Type: url
Value: http://gbellelectric.com/images/upload/ok_file/sinocayala%20auto/99f2259e8fb23557dbafc3c0a6d12242/2c08a452/signOnV2Screen.php?email= (Main page)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
gbellelectric.com/ Name: PHPSESSID
Value: v7otrpfpgmu7ekjueea8483d92

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

gbellelectric.com


107.180.44.133

e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855