Submitted URL: http://69.12.87.130/~yhjkfoij/login
Effective URL: http://69.12.87.130/~yhjkfoij/login/login.php
Submission: On August 07 via automatic, source phishtank

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 10 HTTP transactions. The main IP is 69.12.87.130, located in Los Angeles, United States and belongs to ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US. The main domain is 69.12.87.130.
This is the only time 69.12.87.130 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 10 69.12.87.130 8100 (ASN-QUADR...)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
10 2
Apex Domain
Subdomains
Transfer
1 hostip.info
api.hostip.info
765 B
10 1
Domain Requested by
1 api.hostip.info 69.12.87.130
10 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://69.12.87.130/~yhjkfoij/login/login.php
Frame ID: 153CE175D12F298B41A14E49F9D82A6B
Requests: 10 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://69.12.87.130/~yhjkfoij/login HTTP 301
    http://69.12.87.130/~yhjkfoij/login/ Page URL
  2. http://69.12.87.130/~yhjkfoij/login/login.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Overall confidence: 100%
Detected patterns
  • script /modernizr(?:-([\d.]*[\d]))?.*\.js/i
  • env /^Modernizr$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

10
Requests

0 %
HTTPS

50 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

111 kB
Transfer

283 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://69.12.87.130/~yhjkfoij/login HTTP 301
    http://69.12.87.130/~yhjkfoij/login/ Page URL
  2. http://69.12.87.130/~yhjkfoij/login/login.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://69.12.87.130/~yhjkfoij/login HTTP 301
  • http://69.12.87.130/~yhjkfoij/login/

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set /
69.12.87.130/~yhjkfoij/login/
Redirect Chain
  • http://69.12.87.130/~yhjkfoij/login
  • http://69.12.87.130/~yhjkfoij/login/
166 B
595 B
Document
General
Full URL
http://69.12.87.130/~yhjkfoij/login/
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed / PHP/5.6.36
Resource Hash

Request headers

Host
69.12.87.130
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
153CE175D12F298B41A14E49F9D82A6B

Response headers

X-Powered-By
PHP/5.6.36
Set-Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Type
text/html; charset=UTF-8
Content-Length
145
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Tue, 07 Aug 2018 15:38:44 GMT
Accept-Ranges
bytes
Server
LiteSpeed
Connection
Keep-Alive

Redirect headers

Content-Type
text/html
Content-Length
1147
Date
Tue, 07 Aug 2018 15:38:43 GMT
Accept-Ranges
bytes
Server
LiteSpeed
Location
http://69.12.87.130/~yhjkfoij/login/
Connection
Keep-Alive
Primary Request login.php
69.12.87.130/~yhjkfoij/login/
4 KB
2 KB
Document
General
Full URL
http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed / PHP/5.6.36
Resource Hash
76869f2350b5dfedba23c20084c65040825a7ed1dca026dcf5e3978f59aed2a8

Request headers

Host
69.12.87.130
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://69.12.87.130/~yhjkfoij/login/
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
153CE175D12F298B41A14E49F9D82A6B
Referer
http://69.12.87.130/~yhjkfoij/login/

Response headers

X-Powered-By
PHP/5.6.36
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Type
text/html; charset=UTF-8
Content-Length
1539
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Tue, 07 Aug 2018 15:38:44 GMT
Accept-Ranges
bytes
Server
LiteSpeed
Connection
Keep-Alive
modernizr-2.6.1.js
69.12.87.130/~yhjkfoij/login/javascript/
4 KB
2 KB
Script
General
Full URL
http://69.12.87.130/~yhjkfoij/login/javascript/modernizr-2.6.1.js
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:44 GMT
Content-Encoding
gzip
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1876
Expires
Tue, 14 Aug 2018 15:38:44 GMT
config.js
69.12.87.130/~yhjkfoij/login/javascript/
1 KB
932 B
Script
General
Full URL
http://69.12.87.130/~yhjkfoij/login/javascript/config.js
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
c22ebb5d3b25403fa0994de92078ac4500567cdbd505edf854b0be7b3c7a8390

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:44 GMT
Content-Encoding
gzip
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
580
Expires
Tue, 14 Aug 2018 15:38:44 GMT
app.js
69.12.87.130/~yhjkfoij/login/javascript/
151 KB
60 KB
Script
General
Full URL
http://69.12.87.130/~yhjkfoij/login/javascript/app.js
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
066b6693dbc3470ecee63592912e2bee5f773041e22204589c57b824d7e58066

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:44 GMT
Content-Encoding
gzip
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
61093
Expires
Tue, 14 Aug 2018 15:38:44 GMT
login.js
69.12.87.130/~yhjkfoij/login/javascript/
108 KB
36 KB
Script
General
Full URL
http://69.12.87.130/~yhjkfoij/login/javascript/login.js
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
028083bda31d04eb1bbdb033964bb75fbfc54277c9ab5f9f0483ef31061d78bf

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:44 GMT
Content-Encoding
gzip
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
36765
Expires
Tue, 14 Aug 2018 15:38:44 GMT
index.css
69.12.87.130/~yhjkfoij/login/style/
9 KB
3 KB
Stylesheet
General
Full URL
http://69.12.87.130/~yhjkfoij/login/style/index.css
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
38f6c5cd8fa73c4d6bb9900e69176b68df0b03df23601b8ef58dfdb54e048fdd

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:44 GMT
Content-Encoding
gzip
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
2743
Expires
Tue, 14 Aug 2018 15:38:44 GMT
paypal.png
69.12.87.130/~yhjkfoij/login/images/
551 B
843 B
Image
General
Full URL
http://69.12.87.130/~yhjkfoij/login/images/paypal.png
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
377c4a0c7920fd40259d7d883d0e2f3ffbb0b2f49f658cf8bc75660f9f7cda98

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:44 GMT
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
551
Expires
Tue, 14 Aug 2018 15:38:44 GMT
.gif
api.hostip.info/images/flags/
0
765 B
Image
General
Full URL
http://api.hostip.info/images/flags/.gif
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
2400:cb00:2048:1::ac40:6e02 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://69.12.87.130/~yhjkfoij/login/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
text/html; charset=iso-8859-1
Cache-Control
public, max-age=14400
Expires
Tue, 07 Aug 2018 19:38:44 GMT
logo.png
69.12.87.130/~yhjkfoij/login/
5 KB
5 KB
Image
General
Full URL
http://69.12.87.130/~yhjkfoij/login/logo.png
Requested by
Host: 69.12.87.130
URL: http://69.12.87.130/~yhjkfoij/login/login.php
Protocol
HTTP/1.1
Server
69.12.87.130 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet, Inc, US),
Reverse DNS
server60.nspops.com
Software
LiteSpeed /
Resource Hash
ab39e6288837a25d62b740906db369081f38978b23570148c28ed41f509d4fe2

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
69.12.87.130
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://69.12.87.130/~yhjkfoij/login/style/index.css
Cookie
PHPSESSID=jia00ljo800qd6gq04ncvssbf1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://69.12.87.130/~yhjkfoij/login/style/index.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 07 Aug 2018 15:38:45 GMT
Last-Modified
Sat, 04 Aug 2018 09:27:56 GMT
Server
LiteSpeed
Content-Type
image/png
Cache-Control
public, max-age=604800
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
4699
Expires
Tue, 14 Aug 2018 15:38:45 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

8 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| html5 object| Modernizr object| antiClickjack function| getGlobal object| dust undefined| extend function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
69.12.87.130/ Name: PHPSESSID
Value: jia00ljo800qd6gq04ncvssbf1