www.goodrphilippines.com Open in urlscan Pro
165.231.154.160  Malicious Activity! Public Scan

URL: https://www.goodrphilippines.com/js/jquery.jxb.js
Submission: On March 12 via api from US — Scanned from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 165.231.154.160, located in Washington, United States and belongs to PACKETEXCHANGE, GB. The main domain is www.goodrphilippines.com.
TLS certificate: Issued by R3 on February 19th 2024. Valid for: 3 months.
This is the only time www.goodrphilippines.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Fake Shop (Fashion)

Domain & IP information

IP Address AS Autonomous System
1 165.231.154.160 58065 (PACKETEXC...)
1 1
Apex Domain
Subdomains
Transfer
1 goodrphilippines.com
www.goodrphilippines.com
154 KB
1 1
Domain Requested by
1 www.goodrphilippines.com
1 1

This site contains no links.

Subject Issuer Validity Valid
webmail.goodrphilippines.com
R3
2024-02-19 -
2024-05-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.goodrphilippines.com/js/jquery.jxb.js
Frame ID: CE323D6B47D521FC1315D798122FBE41
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

154 kB
Transfer

154 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request jquery.jxb.js
www.goodrphilippines.com/js/
154 KB
154 KB
Document
General
Full URL
https://www.goodrphilippines.com/js/jquery.jxb.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
165.231.154.160 Washington, United States, ASN58065 (PACKETEXCHANGE, GB),
Reverse DNS
Software
Apache /
Resource Hash
f2374ffefd903e49bfa1772a042c1b593e52cd862e6553f538128ab4a58fe5b5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

Accept-Ranges
bytes
Connection
Keep-Alive
Content-Length
157648
Content-Type
application/javascript
Date
Tue, 12 Mar 2024 15:40:44 GMT
Keep-Alive
timeout=5, max=100
Last-Modified
Sat, 06 May 2017 02:03:44 GMT
Server
Apache

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Fake Shop (Fashion)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.goodrphilippines.com
165.231.154.160
f2374ffefd903e49bfa1772a042c1b593e52cd862e6553f538128ab4a58fe5b5