srv88939.ht-test.ru
Open in
urlscan Pro
78.110.50.131
Malicious Activity!
Public Scan
Effective URL: http://srv88939.ht-test.ru/js/cjuv3439drk0cjptn3fo6hvuzt.php?a=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&.verify?service=nfpb=tr...
Submission: On July 31 via manual from AU
Summary
This is the only time srv88939.ht-test.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.35 167.89.118.35 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 148.72.201.88 148.72.201.88 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
1 6 | 78.110.50.131 78.110.50.131 | 31240 (HT-SYSTEM...) (HT-SYSTEMS-AS Uplinks:) | |
1 | 101.0.112.154 101.0.112.154 | 55803 (DIGITALPA...) (DIGITALPACIFIC-AU Digital Pacific Pty Ltd Australia) | |
6 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789118x35.outbound-mail.sendgrid.net
u5868380.ct.sendgrid.net |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
PTR: ip-148-72-201-88.ip.secureserver.net
upd3.gamingakhada.com |
ASN31240 (HT-SYSTEMS-AS Uplinks:, RU)
PTR: cl33-w.ht-systems.ru
srv88939.ht-test.ru |
ASN55803 (DIGITALPACIFIC-AU Digital Pacific Pty Ltd Australia, AU)
PTR: vmcp24.digitalpacific.com.au
mtr.com.au |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ht-test.ru
1 redirects
srv88939.ht-test.ru |
1 MB |
1 |
mtr.com.au
mtr.com.au |
1 KB |
1 |
gamingakhada.com
1 redirects
upd3.gamingakhada.com |
346 B |
1 |
sendgrid.net
1 redirects
u5868380.ct.sendgrid.net |
273 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
6 | srv88939.ht-test.ru |
1 redirects
srv88939.ht-test.ru
|
1 | mtr.com.au |
srv88939.ht-test.ru
|
1 | upd3.gamingakhada.com | 1 redirects |
1 | u5868380.ct.sendgrid.net | 1 redirects |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://srv88939.ht-test.ru/js/cjuv3439drk0cjptn3fo6hvuzt.php?a=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&loginID=&.
Frame ID: 10A2A2135E83935FA199421421C43084
Requests: 2 HTTP requests in this frame
Frame:
http://srv88939.ht-test.ru/js/ova.php?a=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&i=0&c=
Frame ID: 05DCE60956484FC2524E73DFD5FF0844
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://u5868380.ct.sendgrid.net/ls/click?upn=msQhjaGTB0FydNGGVsehidL-2FxJpK5zznkpphDo0h2uSxNPPD9rnyVLm9qpJZ3...
HTTP 302
http://upd3.gamingakhada.com/redir.php?email=andrew.pearson@mtr.com.au HTTP 302
http://srv88939.ht-test.ru/js/index.php?x=x&a=andrew.pearson@mtr.com.au HTTP 302
http://srv88939.ht-test.ru/js/cjuv3439drk0cjptn3fo6hvuzt.php?a=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&.ve... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Red Hat (Operating Systems) Expand
Detected patterns
- headers server /Red Hat/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u5868380.ct.sendgrid.net/ls/click?upn=msQhjaGTB0FydNGGVsehidL-2FxJpK5zznkpphDo0h2uSxNPPD9rnyVLm9qpJZ3fLHnqCytOVJmgZPfoYA8h8OaRCMEGI1s7JAo-2FVk1b4vSys-3D83x2_GptQX16N64WwKT5la58D1hFZfcMjqVLIdkD9zn4K-2FtI13UirzwjW5zJyf3Kd-2FLGiOFRVLLE3rIxJVstAmMe-2BdLmsvQKjTZpZ2IINnZ3H2j-2BVMOyOLlbrA4A3-2BBU68ize2G4kELHxKUXxvCyc92Ll3ONVCZsYgfgDfUjbJSBSxr1waRJS-2FPkO8myjp-2FXXXvdkPRNAVEP2sEUUretJQEAy8XPPwQBVAV8ZEsP2D-2FNQMfY-3D
HTTP 302
http://upd3.gamingakhada.com/redir.php?email=andrew.pearson@mtr.com.au HTTP 302
http://srv88939.ht-test.ru/js/index.php?x=x&a=andrew.pearson@mtr.com.au HTTP 302
http://srv88939.ht-test.ru/js/cjuv3439drk0cjptn3fo6hvuzt.php?a=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&.verify?service=nfpb=true&_pageLabel=smep_portal_page_login&timedOut=true&_nfls&c=&i=0&false=YW5kcmV3LnBlYXJzb25AbXRyLmNvbS5hdQ==&loginID=&. Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
cjuv3439drk0cjptn3fo6hvuzt.php
srv88939.ht-test.ru/js/ Redirect Chain
|
936 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ova.php
srv88939.ht-test.ru/js/ Frame 05DC |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.jpg
srv88939.ht-test.ru/js/ico/bg/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
srv88939.ht-test.ru/js/css/ Frame 05DC |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js.js
srv88939.ht-test.ru/js/ico/ Frame 05DC |
6 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
mtr.com.au/ Frame 05DC |
1 KB 1 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
srv88939.ht-test.ru/ | Name: PHPSESSID Value: 52683h50ghs7c1asc1ht8lj135 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mtr.com.au
srv88939.ht-test.ru
u5868380.ct.sendgrid.net
upd3.gamingakhada.com
101.0.112.154
148.72.201.88
167.89.118.35
78.110.50.131
119933c0b21258553283a1e821cf2814d56a2d643c52a833f9291a5a941220cd
1bcbd711541fce74fc4c58fce450956c507db9e1e9d83af8f13ed448e114f9a0
6239d424d975e24a4ab64c1b2856fc4f090a3eab00ff05e947af7557c86b9945
a6baa596c961ffab09d260ba7d7c743114ff7016e13e853b9b0f25bceac17255
cc293f55f7f443196dc778b377d322b09d8745b218ac44c9599b7cb1c601259f