URL: http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
Submission: On June 10 via api from CA

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 94.23.21.88, located in France and belongs to OVH, FR. The main domain is berlinaqr.xyz.
This is the only time berlinaqr.xyz was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
1 94.23.21.88 16276 (OVH)
1 104.20.14.105 13335 (CLOUDFLAR...)
1 151.101.12.193 54113 (FASTLY)
3 3
Apex Domain
Subdomains
Transfer
1 imgur.com
i.imgur.com
51 KB
1 prntscr.com
image.prntscr.com
4 KB
1 berlinaqr.xyz
berlinaqr.xyz
1 KB
3 3
Domain Requested by
1 i.imgur.com berlinaqr.xyz
1 image.prntscr.com berlinaqr.xyz
1 berlinaqr.xyz
3 3

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
Frame ID: F90FB34D917B4798AE66A05A54EC226B
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

57 kB
Transfer

57 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request yahoo.html
berlinaqr.xyz/closingstate060518/yahoo/
2 KB
1 KB
Document
General
Full URL
http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
Protocol
HTTP/1.1
Server
94.23.21.88 , France, ASN16276 (OVH, FR),
Reverse DNS
ns323417.ip-94-23-21.eu
Software
nginx /
Resource Hash
f2071848f6cb8404b74479f0fc568e81bec6fad47ecb0d866d098e1419f8ac81
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
berlinaqr.xyz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
F90FB34D917B4798AE66A05A54EC226B

Response headers

Server
nginx
Date
Sun, 10 Jun 2018 05:18:29 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Last-Modified
Mon, 04 Dec 2017 12:53:24 GMT
X-XSS-Protection
1; mode=block
X-Content-Type-Options
nosniff
X-Nginx-Cache-Status
MISS
X-Server-Powered-By
Engintron
Content-Encoding
gzip
GyezWjANTRSu6CSzhwazwg.png
image.prntscr.com/image/
4 KB
4 KB
Image
General
Full URL
https://image.prntscr.com/image/GyezWjANTRSu6CSzhwazwg.png
Requested by
Host: berlinaqr.xyz
URL: http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
Protocol
SPDY
Server
104.20.14.105 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Magic
Resource Hash
dd1e7f679966ba954bf0283b2fa7eb88a1d07d81584624ef1287e9e65b6e55ac

Request headers

Referer
http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sun, 10 Jun 2018 05:18:29 GMT
cf-cache-status
HIT
x-powered-by
Magic
status
200
x-temperature
Warm
content-disposition
inline; filename="GyezWjANTRSu6CSzhwazwg.webp"
content-length
3950
cf-bgj
imgq:100
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
access-control-allow-methods
GET, OPTIONS
content-type
image/webp
access-control-allow-origin
*
cache-control
public, max-age=315360000
cf-polished
origFmt=png, origSize=6920
cf-ray
428960ab5fc196dc-FRA
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Wed, 07 Jun 2028 05:18:29 GMT
YkNAVDT.png
i.imgur.com/
51 KB
51 KB
Image
General
Full URL
https://i.imgur.com/YkNAVDT.png
Requested by
Host: berlinaqr.xyz
URL: http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
Protocol
SPDY
Server
151.101.12.193 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
3995e7f4867863d9bf5d2713fc1e37206b32508d23b20e7e5e257e5aa0f2aae1

Request headers

Referer
http://berlinaqr.xyz/closingstate060518/yahoo/yahoo.html
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Sun, 10 Jun 2018 05:18:29 GMT
age
808397
x-cache
HIT, HIT
status
200
content-length
52066
x-served-by
cache-iad2140-IAD, cache-fra19126-FRA
last-modified
Mon, 04 Dec 2017 11:55:29 GMT
server
cat factory 1.0
x-timer
S1528607910.648675,VS0,VE1
etag
"2ee234fad53bc986daccd736fc20a93b"
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
x-cache-hits
1, 1

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Yahoo (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

berlinaqr.xyz
i.imgur.com
image.prntscr.com
104.20.14.105
151.101.12.193
94.23.21.88
3995e7f4867863d9bf5d2713fc1e37206b32508d23b20e7e5e257e5aa0f2aae1
dd1e7f679966ba954bf0283b2fa7eb88a1d07d81584624ef1287e9e65b6e55ac
f2071848f6cb8404b74479f0fc568e81bec6fad47ecb0d866d098e1419f8ac81