f0498870.xsph.ru Open in urlscan Pro
2a0a:2b43:b:c9aa::  Malicious Activity! Public Scan

Submitted URL: http://www.wolhonka.ru/wp-Exploit/Serv/index.php
Effective URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Submission: On January 10 via manual from AU

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 8 HTTP transactions. The main IP is 2a0a:2b43:b:c9aa::, located in Russian Federation and belongs to SPRINTHOST, RU. The main domain is f0498870.xsph.ru.
This is the only time f0498870.xsph.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DHL (Transportation)

Domain & IP information

IP Address AS Autonomous System
1 1 178.210.68.178 48287 (RU-CENTER)
2 10 2a0a:2b43:b:c... 35278 (SPRINTHOST)
8 2
Apex Domain
Subdomains
Transfer
10 xsph.ru
f0498870.xsph.ru
207 KB
1 wolhonka.ru
www.wolhonka.ru
267 B
8 2
Domain Requested by
10 f0498870.xsph.ru 2 redirects f0498870.xsph.ru
1 www.wolhonka.ru 1 redirects
8 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Frame ID: 30392C42C36B02498E043404D1FD7E9F
Requests: 9 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://www.wolhonka.ru/wp-Exploit/Serv/index.php HTTP 302
    http://f0498870.xsph.ru/Supp/exploit/login-dhl/index.php HTTP 302
    http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/index.php?valid=true&id=8334052 HTTP 302
    http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925 Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Page Statistics

8
Requests

0 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

224 kB
Transfer

418 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://www.wolhonka.ru/wp-Exploit/Serv/index.php HTTP 302
    http://f0498870.xsph.ru/Supp/exploit/login-dhl/index.php HTTP 302
    http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/index.php?valid=true&id=8334052 HTTP 302
    http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 00951124a.php
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/
Redirect Chain
  • http://www.wolhonka.ru/wp-Exploit/Serv/index.php
  • http://f0498870.xsph.ru/Supp/exploit/login-dhl/index.php
  • http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/index.php?valid=true&id=8334052
  • http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
3 KB
2 KB
Document
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
d1515eebf61c158e0253b9c27128a36aab8a1e0710270f2535c20630f11ce2db
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Host
f0498870.xsph.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=d347fbe27d49d98e6ad9af1422173d62
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
openresty
Date
Sun, 10 Jan 2021 04:54:50 GMT
Content-Type
text/html; charset-UTF-8;charset=UTF-8
Content-Length
1232
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
X-UA-Compatible
IE=edge
X-Content-Type-Options
nosniff
X-Robots-Tag
noindex, nofollow

Redirect headers

Server
openresty
Date
Sun, 10 Jan 2021 04:54:50 GMT
Content-Type
text/html; charset-UTF-8;charset=UTF-8
Content-Length
557
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Location
./00951124a.php?web=succes&local=_&id=60596925
X-UA-Compatible
IE=edge
X-Content-Type-Options
nosniff
X-Robots-Tag
noindex, nofollow
style.css
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/css/
209 KB
75 KB
Stylesheet
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/css/style.css
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
993198ae94d90e3ea850f7d6b70443b64cf5f817098c778821edf924c297eea3

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Content-Encoding
gzip
Last-Modified
Tue, 31 Dec 2019 14:06:22 GMT
Server
openresty
ETag
W/"5e0b55de-34299"
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 17 Jan 2021 04:54:50 GMT
style.js
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/js/
96 KB
37 KB
Script
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/js/style.js
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
b56dd0f5e443608e46b42696f86fe376190c1688f2586cf5345b0b43f2973a5c

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Content-Encoding
gzip
Last-Modified
Sun, 11 Nov 2018 20:23:54 GMT
Server
openresty
ETag
W/"5be88fda-17f6f"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 17 Jan 2021 04:54:50 GMT
lg.svg
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/
2 KB
1 KB
Image
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/lg.svg
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
aeed178a287002e32c4a7767dc24b3c732a812cdd42017835055e42db4d2eae1

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 15 Aug 2019 02:02:52 GMT
Server
openresty
ETag
W/"5d54bd4c-7f8"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 17 Jan 2021 04:54:50 GMT
pak.png
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/
878 B
1 KB
Image
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/pak.png
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
4057023fcfa4360934b1a1409a74a40ffbc2bb7dacd2bcc6f69d66a9673f09e8

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Last-Modified
Thu, 15 Aug 2019 03:02:56 GMT
Server
openresty
ETag
"5d54cb60-36e"
Content-Type
image/png
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
878
Expires
Sun, 17 Jan 2021 04:54:50 GMT
ta3.svg
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/
2 KB
1 KB
Image
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/ta3.svg
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
42794908246997d603888b2c2098941e0c3f9b7b0f719134365789189c7edac0

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 15 Aug 2019 23:27:28 GMT
Server
openresty
ETag
W/"5d55ea60-77d"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 17 Jan 2021 04:54:50 GMT
pub.jpg
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/
80 KB
81 KB
Image
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/pub.jpg
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
fd6d79b881550d2aced201e506cbd7dfacafc19c16db81a655ad06f2835819c5

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Last-Modified
Thu, 15 Aug 2019 02:59:12 GMT
Server
openresty
ETag
"5d54ca80-140d5"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
82133
Expires
Sun, 17 Jan 2021 04:54:50 GMT
pubr.gif
f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/
8 KB
8 KB
Image
General
Full URL
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/img/pubr.gif
Requested by
Host: f0498870.xsph.ru
URL: http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
Protocol
HTTP/1.1
Server
2a0a:2b43:b:c9aa:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
38d38e7a9e31f364cf1238ed6efcad478b3d71b56a8070c7aeda136e7a09dfa6

Request headers

Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/00951124a.php?web=succes&local=_&id=60596925
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 10 Jan 2021 04:54:50 GMT
Last-Modified
Thu, 15 Aug 2019 06:49:28 GMT
Server
openresty
ETag
"5d550078-2098"
Content-Type
image/gif
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8344
Expires
Sun, 17 Jan 2021 04:54:50 GMT
truncated
/
17 KB
17 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
79b6bfed5b8e93eafbc4b6cc1aeb1a66256446899c27bfb099fc336fb59d3171

Request headers

Origin
http://f0498870.xsph.ru
Referer
http://f0498870.xsph.ru/Supp/exploit/login-dhl/F004f19441/layout/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
application/font-woff2;charset=utf-8

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DHL (Transportation)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| preventBack object| Modernizr function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
f0498870.xsph.ru/ Name: PHPSESSID
Value: d347fbe27d49d98e6ad9af1422173d62

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff