URL: http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
Submission: On February 06 via automatic , source twitter_illegalFawn

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 4 HTTP transactions.
The main IP is 185.125.230.195, located in Russian Federation and belongs to AS-MAROSNET Moscow, Russia, RU. The main domain is account-login.site.
This is the first time this domain was scanned on urlscan.io!

Verdict: Malicious (Score: 100/100) Show Details

  • urlscan - Score: 100
    phishing
    Phishing against Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 185.125.230.195 48666 (AS-MAROSN...)
1 104.18.62.176 13335 (CLOUDFLAR...)
2 195.181.160.27 60068 (CDN77)
4 3
Domain
Subdomains
Transfer
2 postimg.org
136 KB
1 rawgit.com
17 KB
1 account-login.site
5 KB
4 3
Domain Requested by
2 s2.postimg.org account-login.site
1 rawgit.com account-login.site
1 account-login.site
4 3

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Adblocked dklfexm52nn231yk5dh91517844112.php
/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user
5 KB
5 KB
Document
General
Full URL
http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
Protocol
HTTP/1.1
Server
185.125.230.195 , Russian Federation, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
tango.offshore-servers.com
Software
Apache /
Resource Hash
b573cfec653ac7a886fb75b84834e40195d7b16b594373e49e6087d48aa0235a
Blocked
Source: easylist, Type: privacy (This would have been blocked)

Request headers

Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Connection
keep-alive
Accept-Encoding
gzip, deflate
Host
account-login.site
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 06 Feb 2018 10:56:39 GMT
Server
Apache
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html;charset=utf-8;
Converged1033.css
rawgit.com/Tarsotelvab/Hotmail.github.io/master
85 KB
17 KB
Stylesheet
General
Full URL
https://rawgit.com/Tarsotelvab/Hotmail.github.io/master/Converged1033.css
Requested by
Host: account-login.site
URL: http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
Protocol
SPDY
Server
104.18.62.176 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3d43049cccf6f28ee913aac1cfd163b4bb24e9aacfcbbbdc43915b6ef48dffa2
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 06 Feb 2018 10:56:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
cf-ray
3e8d9584fb676343-FRA
status
200
rawgit-cache-status
BYPASS
server
cloudflare
etag
W/"b6dc707616e16d0be73ec6d143136dc726e9bc4d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css;charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=3600
x-robots-tag
none
expires
Tue, 06 Feb 2018 11:56:39 GMT
microsoft_logo.png
s2.postimg.org/kv4m3xnbd
1 KB
1 KB
Image
General
Full URL
https://s2.postimg.org/kv4m3xnbd/microsoft_logo.png
Requested by
Host: account-login.site
URL: http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
Protocol
HTTP/1.1
Server
195.181.160.27 , United Kingdom, ASN60068 (CDN77, GB),
Reverse DNS
unn-195-181-160-27.10gbps.io
Software
openresty /
Resource Hash
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c

Request headers

Referer
http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 06 Feb 2018 10:58:00 GMT
Last-Modified
Tue, 08 Aug 2017 11:20:54 GMT
Server
openresty
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1057
Expires
Thu, 31 Dec 2037 23:55:55 GMT
image.jpg
s2.postimg.org/ovltbai7t
134 KB
134 KB
Image
General
Full URL
https://s2.postimg.org/ovltbai7t/image.jpg
Requested by
Host: account-login.site
URL: http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
Protocol
HTTP/1.1
Server
195.181.160.27 , United Kingdom, ASN60068 (CDN77, GB),
Reverse DNS
unn-195-181-160-27.10gbps.io
Software
openresty /
Resource Hash
5085132dab9b7c369c7cc358c213cbbda3059bf8c2108b4341b574befb240b9f

Request headers

Referer
http://account-login.site/ws/04du0tiv7f94mbhiiltd3cepm7/activity-login-secure-browser-agent-activate-web-sessions-sid-user/dklfexm52nn231yk5dh91517844112.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 06 Feb 2018 10:58:00 GMT
Last-Modified
Tue, 08 Aug 2017 11:12:48 GMT
Server
openresty
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
137216
Expires
Thu, 31 Dec 2037 23:55:55 GMT

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan - Score: 100

Categories:
phishing

Tags:
phishing

Phishing against: Microsoft (Consumer)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| DivEmail object| DivPass object| DivPass1 object| email object| pass object| pass1 function| ChangeFromEmailToPass function| CheckForPass function| CheckForPassFinal

0 Cookies