banquetroyalenigeria.com
Open in
urlscan Pro
2400:cb00:2048:1::681b:948a
Malicious Activity!
Public Scan
Submission: On December 08 via api from CA
Summary
This is the only time banquetroyalenigeria.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook (Online) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2400:cb00:204... 2400:cb00:2048:1::681b:948a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
8 | 2400:cb00:204... 2400:cb00:2048:1::681b:958a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
banquetroyalenigeria.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
banquetroyalenigeria.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
banquetroyalenigeria.com
banquetroyalenigeria.com |
75 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | banquetroyalenigeria.com |
banquetroyalenigeria.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 3 frames:
Primary Page:
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/accts.php
Frame ID: (A99E2527E094914E012592C1AE5D2C8)
Requests: 3 HTTP requests in this frame
Frame:
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/EN-US(1).htm
Frame ID: (92234E6D32D8A2E4E680E60749A114D9)
Requests: 9 HTTP requests in this frame
Frame:
http://banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/EN-US.htm
Frame ID: (C47BA80BE5EDF6BC735FFB9EF9BCABDD)
Requests: 3 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
accts.php
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/ |
7 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
R3WinLive1033.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ |
25 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
controls.png
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/hig/img/ |
397 B 305 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EN-US(1).htm
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
2 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EN-US.htm
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (C47 |
627 B 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mbox.js
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
event
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Outlook_SISU%20Refresh_Categories.jpg
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
63 KB 63 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style_win8.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
2 KB 422 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-coretag.js
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
standard
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.css
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (C47 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_mail.png
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (C47 |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-coretag.js
banquetroyalenigeria.com/components/com_jce/media/js/dropbox0/login.live.com/hellion/ Frame (922 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook (Online) Generic (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint function| MM_findObj function| MM_validateForm2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
banquetroyalenigeria.com/ | Name: b0ac078b6f5d2bbe14001baf0b8fd32e Value: 753stp0an2efgpt47cir3ja3q7 |
|
.banquetroyalenigeria.com/ | Name: __cfduid Value: d167f193101ed22676f3a7048c043fa7a1512695142 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banquetroyalenigeria.com
2400:cb00:2048:1::681b:948a
2400:cb00:2048:1::681b:958a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