vccivadodara.org
Open in
urlscan Pro
103.21.59.80
Malicious Activity!
Public Scan
Submission: On November 20 via automatic, source openphish
Summary
This is the only time vccivadodara.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic China (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 103.21.59.80 103.21.59.80 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY) | |
10 | 103.129.252.34 103.129.252.34 | 137263 (NETEASE-A...) (NETEASE-AS-AP NETEASE HONG KONG LIMITED) | |
1 | 123.126.97.210 123.126.97.210 | 4808 (CHINA169-...) (CHINA169-BJ China Unicom Beijing Province Network) | |
1 | 223.252.195.133 223.252.195.133 | 45062 (NETEASE-A...) (NETEASE-AS Guangzhou NetEase Computer System Co.) | |
1 | 123.126.97.207 123.126.97.207 | 4808 (CHINA169-...) (CHINA169-BJ China Unicom Beijing Province Network) | |
2 | 123.58.177.13 123.58.177.13 | 45062 (NETEASE-A...) (NETEASE-AS Guangzhou NetEase Computer System Co.) | |
16 | 6 |
ASN394695 (PUBLIC-DOMAIN-REGISTRY, US)
PTR: bh-in-17.webhostbox.net
vccivadodara.org |
ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK)
mimg.127.net | |
mail.163.com |
ASN4808 (CHINA169-BJ China Unicom Beijing Province Network, CN)
PTR: mail-m97210.mail.163.com
ssl.mail.163.com |
ASN45062 (NETEASE-AS Guangzhou NetEase Computer System Co., Ltd., CN)
analytics.163.com |
ASN4808 (CHINA169-BJ China Unicom Beijing Province Network, CN)
PTR: mail-m97207.mail.163.com
iplocator.mail.163.com |
ASN45062 (NETEASE-AS Guangzhou NetEase Computer System Co., Ltd., CN)
PTR: mail-17713.yeah.net
hzp.127.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
127.net
mimg.127.net hzp.127.net |
78 KB |
4 |
163.com
ssl.mail.163.com analytics.163.com mail.163.com iplocator.mail.163.com |
8 KB |
1 |
vccivadodara.org
vccivadodara.org |
20 KB |
16 | 3 |
Domain | Requested by | |
---|---|---|
9 | mimg.127.net |
vccivadodara.org
|
2 | hzp.127.net |
mimg.127.net
|
1 | iplocator.mail.163.com |
mimg.127.net
|
1 | mail.163.com |
vccivadodara.org
|
1 | analytics.163.com |
vccivadodara.org
|
1 | ssl.mail.163.com |
vccivadodara.org
|
1 | vccivadodara.org | |
16 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.163.com |
vipmail.163.com |
hw.mail.163.com |
help.163.com |
reg.163.com |
reg.email.163.com |
qiye.163.com |
corp.163.com |
mail.163.com |
mail.blog.163.com |
ss.cnnic.cn |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ssl.mail.163.com GeoTrust CN RSA CA G1 |
2020-01-07 - 2022-03-05 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://vccivadodara.org/documents/163/user-update.html
Frame ID: A499EFC6B25933C9E66CC30C2CB78DE5
Requests: 15 HTTP requests in this frame
Frame:
http://mail.163.com/preload5.htm
Frame ID: 887F988EB1EA2DBE8E2D367D0AC84692
Requests: 1 HTTP requests in this frame
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: 收费邮
Search URL Search Domain Scan URL
Title: 国外用户登录
Search URL Search Domain Scan URL
Title: 帮助
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: 忘记密码?
Search URL Search Domain Scan URL
Title: 立即注册
Search URL Search Domain Scan URL
Title: 进入管理员登录页面
Search URL Search Domain Scan URL
Title: 关于网易
Search URL Search Domain Scan URL
Title: 关于网易免费邮
Search URL Search Domain Scan URL
Title: 邮箱官方博客
Search URL Search Domain Scan URL
Title: 客户服务
Search URL Search Domain Scan URL
Title: 隐私政策
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
user-update.html
vccivadodara.org/documents/163/ |
59 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base_v2.js
mimg.127.net/index/lib/scripts/ |
19 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ntes_logo.png
mimg.127.net/index/email/img/2012/ |
983 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t.gif
mimg.127.net/p/ |
77 B 478 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
knet.png
mimg.127.net/logo/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
httpsEnable.gif
ssl.mail.163.com/ |
43 B 251 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ntes.js
analytics.163.com/ |
23 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
mimg.127.net/index/email/img/2012/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bgx.png
mimg.127.net/index/email/img/2012/ |
304 B 628 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
mimg.127.net/index/email/img/2012/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arr.png
mimg.127.net/index/email/img/2012/ |
492 B 816 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.jpg
mimg.127.net/index/email/img/2012/ |
38 KB 38 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
preload5.htm
mail.163.com/ Frame 887F |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iplocator
iplocator.mail.163.com/ |
154 B 344 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hztest
hzp.127.net/cte/ |
14 B 333 B |
Script
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hzp
hzp.127.net/cte/ |
8 B 326 B |
Script
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic China (Online)181 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated object| gOption function| fCheckLoginNow function| fCheckAutoLogin function| fAutoLogin undefined| gbForcepc object| oAndroidRedirect function| fCheckBrowser function| fHtml5Tag function| fCheckCookie function| fGetQuery function| fGetQueryHash function| $id function| fTrim function| fParseMNum function| fCheckAccount function| fGetScript function| fGetCookie function| fSetCookie function| fEventListen function| fEventUnlisten function| fRandom function| fUrlP function| fResize function| fFQ function| fStartTime object| gUserInfo object| gVisitorCookie undefined| gMobileNumMailIsForbidden undefined| gMobileNumMailResult object| gMobileNumMail function| fEnData function| loginRequest function| getRnd undefined| DOMContentLoaded function| DOMREADY string| base64EncodeChars function| base64encode function| utf16to8 function| MobCallback boolean| bGettingAlgorithm boolean| bForcepc boolean| bPreviewPc string| _ntes_nacc string| _ntes_nvid number| _ntes_nvtm number| _ntes_nvfi number| _ntes_nvsf number| _ntes_nstm string| _ntes_nurl string| _ntes_ntit string| _ntes_nref string| _ntes_nres string| _ntes_nlag string| _ntes_nscd number| _ntes_nlmf string| _ntes_flsh string| _ntes_nssn number| _ntes_surv function| _ntes_void object| _ntes_domain_array object| _non_ntes_domain_array string| _ntes_cdmn string| _non_ntes_cdmn string| _ntes_src_addr boolean| _ntes_cookie_enabled boolean| _ntes_localstorage_enabled object| _ntes_page_data function| ntes_set_uid function| ntes_get_uid function| neteaseTracker function| neteaseClickTracker function| ntes_survey_popup function| ntes_get_navigation_info function| fetch_visitor_hash function| ntes_get_domain function| non_ntes_get_domain function| ntes_set_cookie_long function| ntes_set_cookie function| ntes_set_cookie_new function| ntes_get_cookie function| ntes_get_flashver number| _ntes_hexcase number| _ntes_chrsz function| ntes_hex_md5 function| ntes_core_md5 function| md5_cmn function| md5_ff function| md5_gg function| md5_hh function| md5_ii function| safe_add function| bit_rol function| str2binl function| binl2hex function| str_to_ent function| ntes_page_click_stat function| ntes_page_unload_stat function| neteaseClickStat function| _ntes_bindEvent function| _ntes_fixEvent function| _ntes_sendInfo function| recordAction function| neteaseClickStatForArea function| ntes_area_click_stat function| is_spider object| ntes_area_click_tools object| pattern object| gWindow function| fCalc function| fChangeBg object| oMain object| oMainHd function| fChangePos function| fCheckboxChange string| gCurrentDomain object| gLoginInfo boolean| bIsEuid object| sPreUrl object| sPreUid object| sPreReason object| sUid object| sStyle undefined| sEnUsername object| oForm object| oFormQiye object| oUrl2 object| oUserName object| oUserIpt object| oTxtAccount object| oTxtPwd object| oDomain object| oDomainQiye object| oStyle object| oGetPwd object| oLoginOpt object| oErr object| oLoginFtTips object| oIdL object| oIdLabel object| oPwL object| oPwLabel function| fSwitchTab function| fSwitchUserInfo function| fSecureLinkage function| fSubmit function| fSetAction function| fSaveLoginInfo function| fCheckqiye function| fGetQiyeMsg function| fStyleEvent function| fCls function| fIdInputEvent function| fCheckAlways undefined| oPopup undefined| oPopupClose undefined| oPopupCont undefined| oPopupSub undefined| oMask function| fKX string| sLocationInfo function| fSetLocation function| fNetErrDebug object| oSpdTestPosition object| aSpdResult object| aSpdStartTime object| aSpdEndTime object| aSpdTmpTime object| aSpdQueue function| fSpeedTestPre function| fSpeedTest function| fSpd undefined| fShowPopup undefined| fHidePopup number| oIntervalCheckAlways boolean| bSpdAuto0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
analytics.163.com
hzp.127.net
iplocator.mail.163.com
mail.163.com
mimg.127.net
ssl.mail.163.com
vccivadodara.org
103.129.252.34
103.21.59.80
123.126.97.207
123.126.97.210
123.58.177.13
223.252.195.133
077d0a60768677750712520353b1b2e0ed265fd49ce1ba1ee7e01d8a053402b4
16ede25c08f54c3b1627d401b847eec08b089227058660799c2372dbd6f52425
17add961a686edb5b25996bcc4e08a14e5e36b6a1796ffbbb9cc751e7ca97ac8
204d74691dddc6b75c75ee09cb62989164cf62f33499528919d64d3e9b93e5b9
3f666934b806964af9be68a39f16151701e7a7b8009ac24e7acb9ac0a7c10aa5
47a3927df7e337d61f09e0a751657250151094a79e4c29c83718890a172a892f
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
4f351f075b297bc471bc0a3f4abc39bee04204393a1543c06fab5b2a5e85264d
75504d17088f01fd3d96848402052b5c6d96965303fcff93482d8a7bbee87de8
86305704cb5ce03d2ce2c34224ecd1f54bfad514a5980bd9453fab19858af4d5
8c65da2d6f0962332bfc51374752fc99fb033b06cd0c4fbf2bbc96c19f3748ee
9affc0ff6e0f96cf80b8bc7cea4ecd81e4ae5f15ce02d9084720af6fc66fa8b4
9ec80cb2a8346a0a6b23c4057f648d59e1816f7f37e9cc7740087f44a3580f54
e4129228b3c1d9183ed091b163797dddf16a2cf72868bb4fa56c98e7a074686d
f0e9f85b36c4c69fe31f7ec954b3b822e2a6a8073355451bd802da9d8bd2ffc6