zeckop.org
Open in
urlscan Pro
94.177.246.247
Malicious Activity!
Public Scan
Submission: On June 05 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 2nd 2018. Valid for: 3 months.
This is the only time zeckop.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 94.177.246.247 94.177.246.247 | 200185 (XANDMAIL-ASN) (XANDMAIL-ASN) | |
23 | 104.16.99.29 104.16.99.29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
25 | 2 |
ASN200185 (XANDMAIL-ASN, DE)
PTR: host247-246-177-94.static.arubacloud.de
zeckop.org |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cfl.dropboxstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
dropboxstatic.com
cfl.dropboxstatic.com |
319 KB |
3 |
zeckop.org
1 redirects
zeckop.org |
81 KB |
25 | 2 |
Domain | Requested by | |
---|---|---|
23 | cfl.dropboxstatic.com |
zeckop.org
|
3 | zeckop.org | 1 redirects |
25 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.dropbox.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
zeckop.org cPanel, Inc. Certification Authority |
2018-06-02 - 2018-08-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://zeckop.org/sec/
Frame ID: 824A37A796F092B7E86AED741F6F170D
Requests: 25 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://zeckop.org/sec
HTTP 301
https://zeckop.org/sec/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
reCAPTCHA (Captchas) Expand
Detected patterns
- html /(?:<div[^>]+id="recaptcha_image|<link[^>]+recaptcha|document\.getElementById\('recaptcha')/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Desktop app
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://zeckop.org/sec
HTTP 301
https://zeckop.org/sec/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
zeckop.org/sec/ Redirect Chain
|
80 KB 81 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
logo-vflM1D8V1.css
cfl.dropboxstatic.com/static/css/index/obsidian/ |
601 B 769 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_navigation-vflslWsEC.css
cfl.dropboxstatic.com/static/css/index/components/ |
31 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_hero-vflkvw3uD.css
cfl.dropboxstatic.com/static/css/index/components/ |
2 KB 748 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_creation-vflfjBRHX.css
cfl.dropboxstatic.com/static/css/index/components/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_media-vflU5svEh.css
cfl.dropboxstatic.com/static/css/index/components/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_page-vfljGUoI3.css
cfl.dropboxstatic.com/static/css/index/ |
92 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
index.web-vflqsLerW.css
cfl.dropboxstatic.com/static/css/spectrum/ |
54 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
recaptcha_v2_challenge-vflYEW-GO.css
cfl.dropboxstatic.com/static/css/ |
945 B 380 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
login_or_register-vfl9esD0O.css
cfl.dropboxstatic.com/static/css/ |
3 KB 986 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
login_form-vfl3Iq3n-.css
cfl.dropboxstatic.com/static/css/components/ |
18 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
homepage_login_register_panel-vfl4EHfbJ.css
cfl.dropboxstatic.com/static/css/rebrand/elements/ |
30 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
glyph_aqua.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/glyphs/ |
676 B 502 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
wordmark_white.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/wordmarks/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
dropbox_digital_desktop_02-vflq-5NiU.jpg
cfl.dropboxstatic.com/static/images/index/rebrand/co_create/desktop/ |
29 KB 29 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
glyph_yellow.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/glyphs/ |
676 B 469 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
glyph_blue.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/glyphs/ |
676 B 455 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
wordmark_black.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/wordmarks/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
AtlasGrotesk-Regular-Web-vflg7ta4-.woff
cfl.dropboxstatic.com/static/fonts/atlasgrotesk/ |
57 KB 57 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ob-arrow-aqua-vflrYQuro.svg
zeckop.org/static/images/index/rebrand/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
SharpGroteskDBBook20-vflytuLBR.woff2
cfl.dropboxstatic.com/static/fonts/sharpgrotesk/ |
43 KB 43 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
SharpGroteskDBMedium22-vflPPMtcG.woff2
cfl.dropboxstatic.com/static/fonts/sharpgrotesk/ |
48 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
SharpGroteskDBMedium20-vfloPliP8.woff2
cfl.dropboxstatic.com/static/fonts/sharpgrotesk/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
AtlasGrotesk-Light-Web-vfl5CyyQq.woff
cfl.dropboxstatic.com/static/fonts/atlasgrotesk/ |
60 KB 60 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
checkmark-vfl56VRyi.svg
cfl.dropboxstatic.com/static/images/ |
1 KB 708 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cfl.dropboxstatic.com
zeckop.org
104.16.99.29
94.177.246.247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