umai.kitchen
Open in
urlscan Pro
103.52.146.250
Malicious Activity!
Public Scan
Submission: On August 23 via manual from IE
Summary
This is the only time umai.kitchen was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Google (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 103.52.146.250 103.52.146.250 | 59147 (IDNIC-DRU...) (IDNIC-DRUPADI-AS-ID PT. Drupadi Prima) | |
1 | 2a00:1288:f03... 2a00:1288:f03d:1fa::4000 | 10310 (YAHOO-1) (YAHOO-1 - Oath Holdings Inc.) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:29f::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 1 | 18.211.9.206 18.211.9.206 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 2606:4700:20:... 2606:4700:20::6819:266c | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2407:ae80:100... 2407:ae80:100:1000::163 | 45062 (NETEASE-A...) (NETEASE-AS Guangzhou NetEase Computer System Co.) | |
1 | 2606:4700::68... 2606:4700::6813:c397 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
13 | 8 |
ASN59147 (IDNIC-DRUPADI-AS-ID PT. Drupadi Prima, ID)
PTR: iix10.whmbox.com
umai.kitchen |
ASN10310 (YAHOO-1 - Oath Holdings Inc., US)
mail.yahoo.com |
ASN15169 (GOOGLE - Google LLC, US)
ssl.gstatic.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-18-211-9-206.compute-1.amazonaws.com
mxmail.optimumelectronics.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
static.hugedomains.com |
ASN45062 (NETEASE-AS Guangzhou NetEase Computer System Co., Ltd., CN)
mail.yeah.net |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
ajax.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
umai.kitchen
umai.kitchen |
27 KB |
1 |
cloudflare.com
ajax.cloudflare.com |
2 KB |
1 |
yeah.net
mail.yeah.net |
662 B |
1 |
hugedomains.com
static.hugedomains.com |
1 KB |
1 |
optimumelectronics.com
1 redirects
mxmail.optimumelectronics.com |
249 B |
1 |
gstatic.com
ssl.gstatic.com |
10 KB |
1 |
gfx.ms
a.gfx.ms Failed auth.gfx.ms |
208 B |
1 |
yahoo.com
mail.yahoo.com |
6 KB |
13 | 8 |
Domain | Requested by | |
---|---|---|
6 | umai.kitchen |
umai.kitchen
|
1 | ajax.cloudflare.com |
umai.kitchen
|
1 | mail.yeah.net |
umai.kitchen
|
1 | static.hugedomains.com |
umai.kitchen
|
1 | mxmail.optimumelectronics.com | 1 redirects |
1 | auth.gfx.ms |
umai.kitchen
|
1 | ssl.gstatic.com |
umai.kitchen
|
1 | mail.yahoo.com |
umai.kitchen
|
0 | a.gfx.ms Failed |
umai.kitchen
|
13 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
*.yahoo.com DigiCert SHA2 High Assurance Server CA |
2019-08-13 - 2019-09-27 |
a month | crt.sh |
*.google.com Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
msagfx.live.com Microsoft IT TLS CA 2 |
2019-06-13 - 2021-06-13 |
2 years | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-08-10 - 2020-02-16 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://umai.kitchen/login/pageo/ii.php?rand=13InboxLightaspxn.1774256418&%3Bfid_4_1252899642=&%3Bfid=4&%3Bfav_1=&%3Brand_13InboxLight_aspxn_1774256418=&%3Bfid_1252899642=&%3Bfid_1=&%3Bemail=&%3B_rand=13InboxLight.aspx?n=1774256418
Frame ID: 06FF3926B1A4EF880EFEC2A2E0B4BC7F
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Windows Server (Operating Systems) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://mail.yahoo.com/favicon.ico HTTP 307
- https://mail.yahoo.com/favicon.ico
- http://mxmail.optimumelectronics.com/mail/skins/default/images/favicon.ico HTTP 302
- http://static.hugedomains.com/faviconhd.ico
- http://ajax.cloudflare.com/cdn-cgi/nexp/dok8v=b064e16429/cloudflare.min.js HTTP 307
- https://ajax.cloudflare.com/cdn-cgi/nexp/dok8v=b064e16429/cloudflare.min.js
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
ii.php
umai.kitchen/login/pageo/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
umai.kitchen/login/pageo/files/ |
127 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
navbar.css
umai.kitchen/login/pageo/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.css
umai.kitchen/login/pageo/files/ |
830 B 688 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
element.js
umai.kitchen/login/pageo/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
mail.yahoo.com/ Redirect Chain
|
5 KB 6 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OLFav.ico
a.gfx.ms/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_strip_2x.png
ssl.gstatic.com/accounts/ui/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
auth.gfx.ms/15.000.22292.00/ |
0 208 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
faviconhd.ico
static.hugedomains.com/ Redirect Chain
|
1 KB 1 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
mail.yeah.net/ |
318 B 662 B |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cloudflare.min.js
ajax.cloudflare.com/cdn-cgi/nexp/dok8v=b064e16429/ Redirect Chain
|
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
element.js
umai.kitchen/login/pageo/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- a.gfx.ms
- URL
- https://a.gfx.ms/OLFav.ico
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Google (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CloudFlare object| a object| b function| googleTranslateElementInit0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a.gfx.ms
ajax.cloudflare.com
auth.gfx.ms
mail.yahoo.com
mail.yeah.net
mxmail.optimumelectronics.com
ssl.gstatic.com
static.hugedomains.com
umai.kitchen
a.gfx.ms
103.52.146.250
18.211.9.206
2407:ae80:100:1000::163
2606:4700:20::6819:266c
2606:4700::6813:c397
2a00:1288:f03d:1fa::4000
2a00:1450:4001:81f::2003
2a02:26f0:6c00:29f::34ef
0142f3173d438638550685f2d48890bab105c89e9f1849e371699ad4575809b5
43c6594eb74940c6e0fb38d55c634425860093660f4eb0cb89334608dd9947eb
5a6c5f7923c7b5ba984f3c4b79b5c3005f3c2f1347a84a6a7b3c16ffbf11777d
74368197cb53191e522e3a73aab974d53eae8e38da694a1ed2cfa06f39176e58
79d1744b3148a4b7265a9d2006eb1f6b72fda68490c398e380cb0692aeb8c5e5
9dcebc73c2ec39725812dbfef59e8d281c01d156b2a68aa20c68f0648eb49692
b2d3305551055e5d28aea38f218ee6ff6006afb8c80cc4f206a206bcb758df7c
be54569ad29e803e8c1a22574e149778dde6194648dc210bcede46bd7a48733f
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855