ip-160-153-244-20.ip.secureserver.net Open in urlscan Pro
160.153.244.20  Malicious Activity! Public Scan

URL: http://ip-160-153-244-20.ip.secureserver.net/attempts/
Submission: On September 28 via automatic, source openphish

Summary

This website contacted 4 IPs in 1 countries across 3 domains to perform 5 HTTP transactions. The main IP is 160.153.244.20, located in Scottsdale, United States and belongs to GODADDY-AMS, DE. The main domain is ip-160-153-244-20.ip.secureserver.net.
This is the only time ip-160-153-244-20.ip.secureserver.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: ANZ Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
3 160.153.244.20 21501 (GODADDY-AMS)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
1 67.202.94.86 32748 (STEADFAST)
5 4
Apex Domain
Subdomains
Transfer
3 secureserver.net
ip-160-153-244-20.ip.secureserver.net
190 KB
1 amung.us
whos.amung.us
212 B
1 waust.at
waust.at
8 KB
5 3
Domain Requested by
3 ip-160-153-244-20.ip.secureserver.net ip-160-153-244-20.ip.secureserver.net
1 whos.amung.us waust.at
1 waust.at ip-160-153-244-20.ip.secureserver.net
5 3

This site contains links to these domains. Also see Links.

Domain
whos.amung.us
Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://ip-160-153-244-20.ip.secureserver.net/attempts/
Frame ID: 2E65755AA93125BE37DD37419F3AF9C1
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /php\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

0 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

4
IPs

1
Countries

198 kB
Transfer

206 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ip-160-153-244-20.ip.secureserver.net/attempts/
5 KB
5 KB
Document
General
Full URL
http://ip-160-153-244-20.ip.secureserver.net/attempts/
Protocol
HTTP/1.1
Server
160.153.244.20 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-244-20.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 /
Resource Hash
c733c0717db567c2909f3dc6dfed9a7ff1f1ad92344c54e5d4103ed9b6b470a9

Request headers

Host
ip-160-153-244-20.ip.secureserver.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 01:33:44 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified
Sat, 26 Sep 2020 05:10:16 GMT
ETag
"1206-5b03072e3be00"
Accept-Ranges
bytes
Content-Length
4614
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
bu.png
ip-160-153-244-20.ip.secureserver.net/attempts/
2 KB
2 KB
Image
General
Full URL
http://ip-160-153-244-20.ip.secureserver.net/attempts/bu.png
Requested by
Host: ip-160-153-244-20.ip.secureserver.net
URL: http://ip-160-153-244-20.ip.secureserver.net/attempts/
Protocol
HTTP/1.1
Server
160.153.244.20 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-244-20.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 /
Resource Hash
49bbf56435544897679a2b22e528138f078f8ea1294be79c20de2dd5154c76e2

Request headers

Referer
http://ip-160-153-244-20.ip.secureserver.net/attempts/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 01:33:44 GMT
Last-Modified
Mon, 14 Dec 2015 17:49:52 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
ETag
"6b4-526df4cd2d000"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
1716
d.js
waust.at/
13 KB
8 KB
Script
General
Full URL
http://waust.at/d.js
Requested by
Host: ip-160-153-244-20.ip.secureserver.net
URL: http://ip-160-153-244-20.ip.secureserver.net/attempts/
Protocol
HTTP/1.1
Server
2606:4700:20::ac43:4739 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
efa8c2057af08d12b4e74599705c6e88f36bda5f4ec712fe58d1286a159fcfa6

Request headers

Referer
http://ip-160-153-244-20.ip.secureserver.net/attempts/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 01:33:44 GMT
content-encoding
gzip
CF-Cache-Status
HIT
Age
1764
Transfer-Encoding
chunked
Connection
keep-alive
cf-request-id
0573f1364f00002b89fe088200000001
last-modified
Sun, 27 Sep 2020 04:17:03 GMT
Server
cloudflare
etag
W/"5f70123f-33b6"
Vary
Accept-Encoding
Content-Type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400
CF-RAY
5d99b7d07dd42b89-FRA
expires
Tue, 29 Sep 2020 01:04:20 GMT
bc.png
ip-160-153-244-20.ip.secureserver.net/attempts/
183 KB
183 KB
Image
General
Full URL
http://ip-160-153-244-20.ip.secureserver.net/attempts/bc.png
Requested by
Host: ip-160-153-244-20.ip.secureserver.net
URL: http://ip-160-153-244-20.ip.secureserver.net/attempts/
Protocol
HTTP/1.1
Server
160.153.244.20 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-244-20.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 /
Resource Hash
e25873f8fcffa37ff168cd3977f6d5ce784296bc9c68e8972ea9a4f58452e0af

Request headers

Referer
http://ip-160-153-244-20.ip.secureserver.net/attempts/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 01:33:44 GMT
Last-Modified
Mon, 14 Dec 2015 17:48:56 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
ETag
"2dbfd-526df497c5200"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
187389
/
whos.amung.us/pingjs/
28 B
212 B
Script
General
Full URL
http://whos.amung.us/pingjs/?k=7zilc9qtyo&t=%7C%7C%20A%20N%20Z%20%7C%7C&c=d&y=&a=0&r=6503
Requested by
Host: waust.at
URL: http://waust.at/d.js
Protocol
HTTP/1.1
Server
67.202.94.86 Chicago, United States, ASN32748 (STEADFAST, US),
Reverse DNS
amung.us
Software
/
Resource Hash
d0cc13a765db32c654809227d047e4bd8925284475f1b500db3bb5a57378b8cc

Request headers

Referer
http://ip-160-153-244-20.ip.secureserver.net/attempts/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Sep 2020 01:33:44 GMT
content-encoding
gzip
transfer-encoding
chunked
content-type
text/javascript;charset=UTF-8
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f4587fb64cd2e7ce26ba21941c80f3ab8d28c257b73d04a87c949b32e4cde2d

Request headers

Referer
http://ip-160-153-244-20.ip.secureserver.net/attempts/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: ANZ Bank (Banking)

19 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| check_all object| _wau string| wau_w_col string| wau_w_siz object| WAU_ren function| WAU_dynamic function| WAU_dynamic_request function| WAU_r_d function| WAU_insert function| WAU_la function| WAU_addCommas function| WAU_lrd function| WAU_lrs function| WAU_cps function| docReady object| x string| x1 string| x2

0 Cookies