test.luxinterest.com
Open in
urlscan Pro
198.54.115.88
Malicious Activity!
Public Scan
Submission: On June 19 via api from US — Scanned from US
Summary
This is the only time test.luxinterest.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: IRS (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 198.54.115.88 198.54.115.88 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 2600:1400:d:5... 2600:1400:d:590::f50 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 2 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server108-2.web-hosting.com
test.luxinterest.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
luxinterest.com
test.luxinterest.com |
129 KB |
1 |
irs.gov
www.irs.gov — Cisco Umbrella Rank: 20058 |
2 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | test.luxinterest.com |
test.luxinterest.com
|
1 | www.irs.gov |
test.luxinterest.com
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.irs.gov Entrust Certification Authority - L1F |
2022-10-04 - 2023-11-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://test.luxinterest.com/form.php
Frame ID: AD242E4ED9899A6F82245D7ACA719FCC
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
IRSDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
form.php
test.luxinterest.com/ |
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
test.luxinterest.com/cdn.jsdelivr.net/npm/bootstrap%404.0.0/dist/css/ |
141 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
test.luxinterest.com/maxcdn.bootstrapcdn.com/bootstrap/4.5.0/css/ |
157 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
test.luxinterest.com/code.jquery.com/ |
84 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
official-site-flag.png
test.luxinterest.com/www.irs.gov/themes/custom/pup_base/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
IRS-Logo.svg
www.irs.gov/pub/image/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hero-1-optimized.jpg
test.luxinterest.com/www.irs.gov/pub/2021-10/ |
30 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: IRS (Government)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| showPage function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
test.luxinterest.com
www.irs.gov
198.54.115.88
2600:1400:d:590::f50
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0f43618580dd31a8096effd969ca2af7e26ba8555ab8d732e5b32fe2ef8e8cf6
2aed0559ebb58b74e1ae783ef624dbbc9f70390a2648dc1787af6c68122ec510
2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d
680af6669abc319f9803f0fa26d443df1b6bc29133d88a8e4bea560ffed7288c
8d445473fbb4f2848058d9251d1887c966a0d90d325ffdb346641d496209196d
9ee545f8c50031535751e547b30cb89491089e64c05a2ea6db057b767db08ae8