muhamadikbal.ind.ws Open in urlscan Pro
5.189.160.228  Malicious Activity! Public Scan

Submitted URL: http://dudkap6.sk1.pl/alibab/indxx.php?login=amy.deng@ericsson.com
Effective URL: http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
Submission: On September 04 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 5.189.160.228, located in Germany and belongs to CONTABO to AS1299 announce AS34933, DE. The main domain is muhamadikbal.ind.ws.
This is the only time muhamadikbal.ind.ws was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Alibaba (Online)

Domain & IP information

IP Address AS Autonomous System
3 5.189.160.228 51167 (CONTABO t...)
3 1
Apex Domain
Subdomains
Transfer
3 ind.ws
muhamadikbal.ind.ws
742 KB
3 1
Domain Requested by
3 muhamadikbal.ind.ws muhamadikbal.ind.ws
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
Frame ID: 12351.1
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

742 kB
Transfer

742 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.php
muhamadikbal.ind.ws/Alibaba/
Redirect Chain
  • http://dudkap6.sk1.pl/alibab/indxx.php?login=amy.deng@ericsson.com
  • http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
2 KB
2 KB
Document
General
Full URL
http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
Protocol
HTTP/1.1
Server
5.189.160.228 , Germany, ASN51167 (CONTABO to AS1299 announce AS34933, DE),
Reverse DNS
opal.daxa.net
Software
Apache / PHP/5.4.45
Resource Hash
aaad216808927ed159cbd607f88a933b3e023ccea59ded17a909dfe230177805

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 04 Sep 2017 08:06:41 GMT
Server
Apache
X-Powered-By
PHP/5.4.45
Transfer-Encoding
chunked
Content-Type
text/html
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection
close
Expires
Thu, 19 Nov 1981 08:52:00 GMT

Redirect headers

Date
Mon, 04 Sep 2017 08:06:39 GMT
Server
Apache
X-Powered-By
PHP/5.2.17
Content-Type
text/html
Location
http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
0
login258.png
muhamadikbal.ind.ws/Alibaba/
1 KB
1 KB
Image
General
Full URL
http://muhamadikbal.ind.ws/Alibaba/login258.png
Requested by
Host: muhamadikbal.ind.ws
URL: http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
Protocol
HTTP/1.1
Server
5.189.160.228 , Germany, ASN51167 (CONTABO to AS1299 announce AS34933, DE),
Reverse DNS
opal.daxa.net
Software
Apache /
Resource Hash
5dd148a341ff7ef90745211d7e76100c4aa409215da12c1dd92ef0042f877873

Request headers

Referer
http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Mon, 04 Sep 2017 08:06:41 GMT
Last-Modified
Wed, 03 May 2017 14:01:52 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
1093
Content-Type
image/png
ds458.png
muhamadikbal.ind.ws/Alibaba/
740 KB
740 KB
Image
General
Full URL
http://muhamadikbal.ind.ws/Alibaba/ds458.png
Requested by
Host: muhamadikbal.ind.ws
URL: http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
Protocol
HTTP/1.1
Server
5.189.160.228 , Germany, ASN51167 (CONTABO to AS1299 announce AS34933, DE),
Reverse DNS
opal.daxa.net
Software
Apache /
Resource Hash
7e64534854f1bd9f9d321abb4718fb6f96649b129d51e3ff3bea63aa41db3234

Request headers

Referer
http://muhamadikbal.ind.ws/Alibaba/index.php?email=amy.deng@ericsson.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Mon, 04 Sep 2017 08:06:41 GMT
Last-Modified
Sat, 06 May 2017 17:13:40 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
757484
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Alibaba (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
muhamadikbal.ind.ws/ Name: PHPSESSID
Value: 9f7cdb513156819d6d73967ae56960b5

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

muhamadikbal.ind.ws
5.189.160.228
5dd148a341ff7ef90745211d7e76100c4aa409215da12c1dd92ef0042f877873
7e64534854f1bd9f9d321abb4718fb6f96649b129d51e3ff3bea63aa41db3234
aaad216808927ed159cbd607f88a933b3e023ccea59ded17a909dfe230177805