www.three.user-billing.com Open in urlscan Pro
198.187.29.142  Malicious Activity! Public Scan

Submitted URL: https://www.three.user-billing.com/
Effective URL: https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel...
Submission: On January 23 via automatic, source certstream-suspicious

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 4 HTTP transactions. The main IP is 198.187.29.142, located in Los Angeles, United States and belongs to NAMECHEAP-NET, US. The main domain is www.three.user-billing.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 23rd 2021. Valid for: a year.
This is the only time www.three.user-billing.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Three UK (Telecommunication)

Domain & IP information

IP Address AS Autonomous System
1 4 198.187.29.142 22612 (NAMECHEAP...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
4 2
Apex Domain
Subdomains
Transfer
4 user-billing.com
www.three.user-billing.com
77 KB
1 cloudflare.com
cdnjs.cloudflare.com
27 KB
4 2
Domain Requested by
4 www.three.user-billing.com 1 redirects www.three.user-billing.com
1 cdnjs.cloudflare.com www.three.user-billing.com
4 2

This site contains links to these domains. Also see Links.

Domain
www.three.co.uk
store.three.co.uk
Subject Issuer Validity Valid
three.user-billing.com
Sectigo RSA Domain Validation Secure Server CA
2021-01-23 -
2022-01-23
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-10-21 -
2021-10-20
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
Frame ID: 60CBA043C5FE76AC26F4E480EDF30ACA
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.three.user-billing.com/ HTTP 302
    https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFj... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

104 kB
Transfer

606 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.three.user-billing.com/ HTTP 302
    https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Login.php
www.three.user-billing.com/
Redirect Chain
  • https://www.three.user-billing.com/
  • https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conY...
195 KB
23 KB
Document
General
Full URL
https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
198.187.29.142 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server127-1.web-hosting.com
Software
Apache / PHP/7.2.34
Resource Hash
60b37c3ba2753abaa376b2f5aba67a414a66d074dfb3919ffdf09bd76d4d3154

Request headers

:method
GET
:authority
www.three.user-billing.com
:scheme
https
:path
/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
PHPSESSID=ba182a0a5c204678f1efcf07a62a3746
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 23 Jan 2021 17:14:07 GMT
server
Apache
x-powered-by
PHP/7.2.34
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
vary
Accept-Encoding
content-encoding
gzip
content-length
23299
content-type
text/html; charset=UTF-8

Redirect headers

date
Sat, 23 Jan 2021 17:14:07 GMT
server
Apache
x-powered-by
PHP/7.2.34
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
set-cookie
PHPSESSID=ba182a0a5c204678f1efcf07a62a3746; path=/
location
Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
content-length
254
content-type
text/html; charset=UTF-8
main.css
www.three.user-billing.com/assets/css/
322 KB
53 KB
Stylesheet
General
Full URL
https://www.three.user-billing.com/assets/css/main.css
Requested by
Host: www.three.user-billing.com
URL: https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
198.187.29.142 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server127-1.web-hosting.com
Software
Apache /
Resource Hash
9ef914b3c249308804f61f93fa44acee13f8a61b6a99b19c8d7f21167a42397d

Request headers

Referer
https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 23 Jan 2021 17:14:08 GMT
content-encoding
gzip
last-modified
Wed, 11 Nov 2020 19:10:04 GMT
server
Apache
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
53657
main.js
www.three.user-billing.com/assets/js/
5 KB
1 KB
Script
General
Full URL
https://www.three.user-billing.com/assets/js/main.js
Requested by
Host: www.three.user-billing.com
URL: https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
198.187.29.142 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server127-1.web-hosting.com
Software
Apache /
Resource Hash
ebc2c25984028f9f9eec3fdfe9289b06666adc0219c18edc77d5628cbfb14396

Request headers

Referer
https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 23 Jan 2021 17:14:08 GMT
content-encoding
gzip
last-modified
Wed, 11 Nov 2020 21:07:18 GMT
server
Apache
vary
Accept-Encoding
content-type
application/javascript
accept-ranges
bytes
content-length
895
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/
85 KB
27 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js
Requested by
Host: www.three.user-billing.com
URL: https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:125e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.three.user-billing.com/Login.php?sslchannel=true&sessionid=vJ1t6mSQFxOf8MmeENTOYrGaIJacnNtBSErExGFjssLSqPmSCPglKQ7NmZel0IrITEEZOtkaLrQ0VbfntZoSmCr06GbWdMzaPUBcF9mdcs8PPmigQN7hWCtY14conYCIhG
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 23 Jan 2021 17:14:08 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"report_to":"cf-nel","max_age":604800}
age
242455
cross-origin-resource-policy
cross-origin
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
27192
cf-request-id
07d1d6373e00000eab9a2ec000000001
timing-allow-origin
*
last-modified
Mon, 04 May 2020 16:11:48 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec4-152b5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000
report-to
{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=iJsQJK99EqaTibemyinvSZ5aPlSxxchlRQRGIXgV5oeS5B7Sc9D8O9lq7ho8nWYCDwU4xgpxvpr%2FobIjE%2Bgd610%2FTYkZPLo9A9ZLJvj2b%2FrYrSBGfbgZ4El4edRit2ShOg%3D%3D"}]}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=30672000
accept-ranges
bytes
cf-ray
616326386cee0eab-FRA
expires
Thu, 13 Jan 2022 17:14:08 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Three UK (Telecommunication)

16 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| mob_men function| nullCheck function| hide_label function| passMask function| $ function| jQuery function| numbersOnly

1 Cookies

Domain/Path Name / Value
www.three.user-billing.com/ Name: PHPSESSID
Value: ba182a0a5c204678f1efcf07a62a3746