www.lianying77.com
Open in
urlscan Pro
162.213.123.155
Malicious Activity!
Public Scan
Effective URL: https://www.lianying77.com/t-online/co.intex/auth12a1.html
Submission: On June 09 via automatic, source phishtank
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 11th 2018. Valid for: 3 months.
This is the only time www.lianying77.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telekom (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 162.213.123.155 162.213.123.155 | 40244 (TURNKEY-I...) (TURNKEY-INTERNET - Turnkey Internet Inc.) | |
5 | 62.157.140.200 62.157.140.200 | 3320 (DTAG Inte...) (DTAG Internet service provider operations) | |
11 | 2 |
ASN40244 (TURNKEY-INTERNET - Turnkey Internet Inc., US)
PTR: 162-213-123-155.static.as40244.net
www.lianying77.com |
ASN3320 (DTAG Internet service provider operations, DE)
PTR: accounts.login.idm.telekom.com
accounts.login.idm.telekom.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
lianying77.com
1 redirects
www.lianying77.com |
271 KB |
5 |
telekom.com
accounts.login.idm.telekom.com |
177 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.lianying77.com |
1 redirects
www.lianying77.com
|
5 | accounts.login.idm.telekom.com |
www.lianying77.com
|
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
meinkonto.telekom-dienste.de |
www.telekom.de |
www.telekom.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
lianying77.com cPanel, Inc. Certification Authority |
2018-05-11 - 2018-08-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.lianying77.com/t-online/co.intex/auth12a1.html
Frame ID: 9675F34F44664F4E571E379AE4CDD8DB
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.lianying77.com/
HTTP 301
https://www.lianying77.com/t-online/co.intex/auth12a1.html Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Passwort vergessen?
Search URL Search Domain Scan URL
Title: Jetzt registrieren
Search URL Search Domain Scan URL
Title: Impressum
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.lianying77.com/
HTTP 301
https://www.lianying77.com/t-online/co.intex/auth12a1.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
auth12a1.html
www.lianying77.com/t-online/co.intex/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.min.css
www.lianying77.com/t-online/static/vdplus/css/ |
88 KB 88 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
www.lianying77.com/t-online/static/factorx/vdplus/css/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.3.min.js
www.lianying77.com/t-online/static/vdplus/js/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.min.js
www.lianying77.com/t-online/static/vdplus/js/ |
66 KB 67 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
www.lianying77.com/t-online/static/factorx/vdplus/js/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-regular.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
54 KB 54 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telekomicon-outline.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
9 KB 9 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-bold.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
53 KB 53 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-thin.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
57 KB 58 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telekomicon-ui.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
3 KB 3 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telekom (Telecommunication)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| accountLocked boolean| accountLockedPermanent number| accountLockExpiration function| $ function| jQuery object| Login object| jQuery1113038684497614048710 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
accounts.login.idm.telekom.com
www.lianying77.com
162.213.123.155
62.157.140.200
21d4dc49ec496581969051f9f542afee01f9029e7db6112bff99e7be2942de53
345466d497966801ab4b5390c09e49d03f2ede8539bd35a56e25ed15bb2dc80e
43493c8fdfe7935a395920ef619a4dc56c440479ce190ad2ac1df8e23acc5595
435a94fe41e7c575f3981c98b9d44b45853b0aba3a7e97e6ceb4ae26711d0657
d3f14d30fdf827b2b3fbbd044f6d6b9bf26751a457f2a68ef89308fdc2ac5b7b
ddb8c6fcd97c6216f6293cea9de34f9730ffca03374de6dec4f89b6802cb0928
e185aceb03040c947c211bc9e972ce427f11c5801338fd8f943e3b53e229eb3e
e1b1f6b64573c86c3b9f5f023ab7e791a074dbccb87d61e886cb6fa659ba9485
e5a1bef74748388cadf99777549feff118627b888816a6f57fc0fb36e3cad57f
ecb916133a9376911f10bc5c659952eb0031e457f5df367cde560edbfba38fb8
f4bdd94ae4110f76fc743176491fc08ad118e75d6390da9f2d3f12854cbedcd6