mail.youweb.com.br
Open in
urlscan Pro
216.59.21.44
Malicious Activity!
Public Scan
Effective URL: https://mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/
Submission: On January 25 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on April 10th 2017. Valid for: a year.
This is the only time mail.youweb.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 23.95.57.202 23.95.57.202 | 36352 (AS-COLOCR...) (AS-COLOCROSSING - ColoCrossing) | |
4 | 216.59.21.44 216.59.21.44 | 15085 (IMMEDION) (IMMEDION - Immedion) | |
5 | 2 |
ASN36352 (AS-COLOCROSSING - ColoCrossing, US)
PTR: pathfinder.securehostingpanel.com
www.jaifornhs.edu.bd |
ASN15085 (IMMEDION - Immedion, LLC, US)
PTR: mail.youweb.com.br
mail.youweb.com.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
youweb.com.br
mail.youweb.com.br |
78 KB |
1 |
jaifornhs.edu.bd
www.jaifornhs.edu.bd |
632 B |
5 | 2 |
Domain | Requested by | |
---|---|---|
4 | mail.youweb.com.br |
mail.youweb.com.br
|
1 | www.jaifornhs.edu.bd | |
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mail.youweb.com.br cPanel, Inc. Certification Authority |
2017-04-10 - 2018-04-10 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/
Frame ID: (CB36A4D0D7FFA1D5FD048EAD204C7BD5)
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.jaifornhs.edu.bd/.well-known/pki-validation/ Page URL
- https://mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.jaifornhs.edu.bd/.well-known/pki-validation/ Page URL
- https://mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.jaifornhs.edu.bd/.well-known/pki-validation/ |
417 B 632 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/st/ |
53 KB 53 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alert.png
mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lo9o.svg
mail.youweb.com.br/~gaviao/adm/5885d80a15885d8/5885d80a13c0db1f8e051cb40a5393d96fec50118c72/img/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| check0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.youweb.com.br
www.jaifornhs.edu.bd
216.59.21.44
23.95.57.202
2a19d958cba72f93548bf49f04c78714a2305e54169937925b32136699013e8b
671445cc91643fb46681665079151713639d185ec4660420f9741e729c9522ea
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
d969cb3941047728d0528f7df0b051d03dbe720fc4f3ab20ebec482868eb11ae
e72d5d5057dd618349cc5c13c78d856ecfab9715e9b8485d7d82f5e578ea7e35