ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud Open in urlscan Pro
141.125.73.153  Malicious Activity! Public Scan

Submitted URL: https://hudanp.com/all/skbro.php
Effective URL: https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Submission: On April 08 via manual from GB

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 141.125.73.153, located in United States and belongs to SOFTLAYER, US. The main domain is ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud.
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on August 27th 2020. Valid for: a year.
This is the only time ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 167.86.66.101 51167 (CONTABO)
5 141.125.73.153 36351 (SOFTLAYER)
5 1
Domain Requested by
5 ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud
1 hudanp.com 1 redirects
5 2

This site contains no links.

Subject Issuer Validity Valid
*.eu-gb.cf.appdomain.cloud
DigiCert SHA2 Secure Server CA
2020-08-27 -
2021-09-01
a year crt.sh

This page contains 1 frames:

Primary Page: https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Frame ID: 54E7BF6602C96C019877BA62EC8FCD7C
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://hudanp.com/all/skbro.php HTTP 302
    https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email= Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

9 kB
Transfer

12 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://hudanp.com/all/skbro.php HTTP 302
    https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/
Redirect Chain
  • https://hudanp.com/all/skbro.php
  • https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
3 KB
1 KB
Document
General
Full URL
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
141.125.73.153 , United States, ASN36351 (SOFTLAYER, US),
Reverse DNS
99.49.7d8d.ip4.static.sl-reverse.com
Software
Apache /
Resource Hash
76c3034add794953d0fe1b81313de16eadf2b256258e21942c296b4046f9c43a

Request headers

Host
ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

X-Backside-Transport
OK OK
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Thu, 08 Apr 2021 10:44:43 GMT
Server
Apache
Vary
Accept-Encoding
X-Global-Transaction-ID
104ed9dd606ede9b6888aedf

Redirect headers

Date
Thu, 08 Apr 2021 10:44:42 GMT
Server
Apache
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Security-Policy
upgrade-insecure-requests;
Location
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.css
ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/
2 KB
877 B
Stylesheet
General
Full URL
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/style.css
Requested by
Host: ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud
URL: https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
141.125.73.153 , United States, ASN36351 (SOFTLAYER, US),
Reverse DNS
99.49.7d8d.ip4.static.sl-reverse.com
Software
Apache /
Resource Hash
a641e8b3ced4c3749610a53d0c8ff739e133723cdd0222d1d33dd9362f67741b

Request headers

Referer
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 08 Apr 2021 10:44:43 GMT
Content-Encoding
gzip
Last-Modified
Fri, 12 Mar 2021 19:03:23 GMT
Server
Apache
Etag
"6a3-5bd5b8dd874c0-gzip"
Vary
Accept-Encoding
Content-Type
text/css
X-Backside-Transport
OK OK
Transfer-Encoding
chunked
Connection
Keep-Alive
X-Global-Transaction-ID
104ed9dd606ede9b79565237
logo.svg
ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/
888 B
1 KB
Image
General
Full URL
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/logo.svg
Requested by
Host: ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud
URL: https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
141.125.73.153 , United States, ASN36351 (SOFTLAYER, US),
Reverse DNS
99.49.7d8d.ip4.static.sl-reverse.com
Software
Apache /
Resource Hash
2b2d9c7a82f92976268b03e13c61f64ead91a3c63b97c59cef2acbf501f67618

Request headers

Referer
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 08 Apr 2021 10:44:43 GMT
Last-Modified
Thu, 28 Jan 2021 07:15:44 GMT
Server
Apache
Etag
"378-5b9f0a7ea6800"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
X-Backside-Transport
OK OK
X-Global-Transaction-ID
c0d86ca7606ede9b10e8c099
Connection
Keep-Alive
zoho.png
ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/
4 KB
5 KB
Image
General
Full URL
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/zoho.png
Requested by
Host: ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud
URL: https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
141.125.73.153 , United States, ASN36351 (SOFTLAYER, US),
Reverse DNS
99.49.7d8d.ip4.static.sl-reverse.com
Software
Apache /
Resource Hash
569f813bd239f2d09147696fe255a71880d17c34d90f9d07fa4f4088e1e842a3

Request headers

Referer
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 08 Apr 2021 10:44:43 GMT
Last-Modified
Fri, 12 Mar 2021 17:42:49 GMT
Server
Apache
Etag
"113e-5bd5a6db77840"
Transfer-Encoding
chunked
Content-Type
image/png
X-Backside-Transport
OK OK
X-Global-Transaction-ID
5ed21c22606ede9b6d3285bf
Connection
Keep-Alive
script.js
ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/
2 KB
1 KB
Script
General
Full URL
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/script.js
Requested by
Host: ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud
URL: https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
141.125.73.153 , United States, ASN36351 (SOFTLAYER, US),
Reverse DNS
99.49.7d8d.ip4.static.sl-reverse.com
Software
Apache /
Resource Hash
ef6ac6a07f312d9884a15c59b454166306b209f32109151ae8f93d45703c4ce4

Request headers

Referer
https://ytrewqmailboxskybroqwertyuioplkjhgfdsvcvbnmlpokijuhytgrflopiqwe.eu-gb.cf.appdomain.cloud/?error=passerror&email=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 08 Apr 2021 10:44:43 GMT
Content-Encoding
gzip
Last-Modified
Sat, 13 Mar 2021 17:03:01 GMT
Server
Apache
Etag
"853-5bd6dfd38db40-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
X-Backside-Transport
OK OK
Transfer-Encoding
chunked
Connection
Keep-Alive
X-Global-Transaction-ID
104ed9dd606ede9b6888af5f

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| btnNext

0 Cookies