banquetroyalenigeria.com
Open in
urlscan Pro
2400:cb00:2048:1::681b:958a
Malicious Activity!
Public Scan
Effective URL: http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/accts.php?login.srf?wa=wsignin1.0&rpsnv=12&c...
Submission: On December 10 via automatic, source openphish
Summary
This is the only time banquetroyalenigeria.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook (Online) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 2400:cb00:204... 2400:cb00:2048:1::681b:958a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
8 | 2400:cb00:204... 2400:cb00:2048:1::681b:948a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
16 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
banquetroyalenigeria.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
banquetroyalenigeria.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
banquetroyalenigeria.com
1 redirects
banquetroyalenigeria.com |
76 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
17 | banquetroyalenigeria.com |
1 redirects
banquetroyalenigeria.com
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 3 frames:
Primary Page:
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/accts.php?login.srf?wa=wsignin1.0&rpsnv=12&ct=1425083828&rver=6.4.6456.0&wp=MBI_SSL_SHARED&wreply=httpsbay169.mail.live.com%default.aspxFrru3inbox&lc=1033&id=64855&mkt=en-us&cbcxt=mai&email=
Frame ID: (E5216646352FF9EBEDCB7EEE444C653A)
Requests: 3 HTTP requests in this frame
Frame:
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/EN-US(1).htm
Frame ID: (626C9E54DFA9D6CEB481F74461BE2C5)
Requests: 10 HTTP requests in this frame
Frame:
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/EN-US.htm
Frame ID: (53662F1E0779179D56CA78FAA374BE99)
Requests: 3 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/
HTTP 302
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/accts.php?login.srf?wa=w... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/
HTTP 302
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/accts.php?login.srf?wa=wsignin1.0&rpsnv=12&ct=1425083828&rver=6.4.6456.0&wp=MBI_SSL_SHARED&wreply=httpsbay169.mail.live.com%default.aspxFrru3inbox&lc=1033&id=64855&mkt=en-us&cbcxt=mai&email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
accts.php
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/ Redirect Chain
|
7 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
R3WinLive1033.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ |
25 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
controls.png
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/hig/img/ |
397 B 305 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EN-US(1).htm
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
2 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mbox.js
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
event
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Outlook_SISU%20Refresh_Categories.jpg
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
63 KB 63 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style_win8.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
2 KB 422 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-coretag.js
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
standard
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EN-US.htm
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (536 |
627 B 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (536 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_mail.png
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (536 |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-coretag.js
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
standard
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (626 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook (Online) Generic (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint function| MM_findObj function| MM_validateForm2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
banquetroyalenigeria.com/ | Name: b0ac078b6f5d2bbe14001baf0b8fd32e Value: 96o35g12mbk6d8mst6oshbpgb5 |
|
.banquetroyalenigeria.com/ | Name: __cfduid Value: d410ec26ba8ebbedb88bb441b8afdd1251512946968 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banquetroyalenigeria.com
2400:cb00:2048:1::681b:948a
2400:cb00:2048:1::681b:958a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