URL: http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Submission: On August 22 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 93.125.99.16, located in Minsk, Belarus and belongs to BELPAK-AS BELPAK, BY. The main domain is dolly.by.
This is the only time dolly.by was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Alibaba (Online)

Domain & IP information

IP Address AS Autonomous System
4 93.125.99.16 6697 (BELPAK-AS...)
4 1
Apex Domain
Subdomains
Transfer
4 dolly.by
dolly.by
384 KB
4 1
Domain Requested by
4 dolly.by dolly.by
4 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Frame ID: 16784.1
Requests: 4 HTTP requests in this frame

Screenshot


Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

384 kB
Transfer

390 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
dolly.by/slazaa/Alibaba/alibaba/alibaba/
Redirect Chain
  • http://dolly.by/slazaa/Alibaba/alibaba/alibaba
  • http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
6 KB
1 KB
Document
General
Full URL
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Protocol
HTTP/1.1
Server
93.125.99.16 Minsk, Belarus, ASN6697 (BELPAK-AS BELPAK, BY),
Reverse DNS
vh46.hosterby.com
Software
nginx/1.10.3 / PHP/5.3.29
Resource Hash
574567e93eeb22227b5d59166f6408d50740063919877e654316e9fd4b2adc52

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.90 Safari/537.36

Response headers

Date
Tue, 22 Aug 2017 11:39:00 GMT
Content-Encoding
gzip
Server
nginx/1.10.3
X-Powered-By
PHP/5.3.29
Vary
Accept-Encoding
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive

Redirect headers

Date
Tue, 22 Aug 2017 11:39:00 GMT
Content-Encoding
gzip
Server
nginx/1.10.3
Vary
Accept-Encoding
Content-Type
text/html; charset=iso-8859-1
Location
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Connection
keep-alive
Content-Length
201
img2.png
dolly.by/slazaa/Alibaba/alibaba/alibaba/images/
327 KB
327 KB
Image
General
Full URL
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/images/img2.png
Requested by
Host: dolly.by
URL: http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Protocol
HTTP/1.1
Server
93.125.99.16 Minsk, Belarus, ASN6697 (BELPAK-AS BELPAK, BY),
Reverse DNS
vh46.hosterby.com
Software
nginx/1.10.3 /
Resource Hash
c3de8a20b257b3e3edadd946d59bbee31d90f6f84ed6e9619904669199c0461e

Request headers

Referer
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.90 Safari/537.36

Response headers

Date
Tue, 22 Aug 2017 11:39:00 GMT
Last-Modified
Thu, 21 May 2015 20:27:56 GMT
Server
nginx/1.10.3
ETag
"555e3fcc-51d30"
Content-Type
image/png
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
335152
Expires
Tue, 29 Aug 2017 11:39:00 GMT
img1.jpg
dolly.by/slazaa/Alibaba/alibaba/alibaba/images/
54 KB
54 KB
Image
General
Full URL
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/images/img1.jpg
Requested by
Host: dolly.by
URL: http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Protocol
HTTP/1.1
Server
93.125.99.16 Minsk, Belarus, ASN6697 (BELPAK-AS BELPAK, BY),
Reverse DNS
vh46.hosterby.com
Software
nginx/1.10.3 /
Resource Hash
c55290da88f9b88dcc6e593fa17a5281841b40f4324557c75cc5a2c5eb96f6ac

Request headers

Referer
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.90 Safari/537.36

Response headers

Date
Tue, 22 Aug 2017 11:39:00 GMT
Last-Modified
Thu, 21 May 2015 20:27:44 GMT
Server
nginx/1.10.3
ETag
"555e3fc0-d9a0"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55712
Expires
Tue, 29 Aug 2017 11:39:00 GMT
img3.gif
dolly.by/slazaa/Alibaba/alibaba/alibaba/images/
1 KB
1 KB
Image
General
Full URL
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/images/img3.gif
Requested by
Host: dolly.by
URL: http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
Protocol
HTTP/1.1
Server
93.125.99.16 Minsk, Belarus, ASN6697 (BELPAK-AS BELPAK, BY),
Reverse DNS
vh46.hosterby.com
Software
nginx/1.10.3 /
Resource Hash
f789f6aa5304d63550e35f144eb65f131104ecb1e38cfacd51f7f63792579503

Request headers

Referer
http://dolly.by/slazaa/Alibaba/alibaba/alibaba/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.90 Safari/537.36

Response headers

Date
Tue, 22 Aug 2017 11:39:00 GMT
Last-Modified
Thu, 21 May 2015 20:28:04 GMT
Server
nginx/1.10.3
ETag
"555e3fd4-564"
Content-Type
image/gif
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1380
Expires
Tue, 29 Aug 2017 11:39:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Alibaba (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies