a0411814.xsph.ru
Open in
urlscan Pro
2a0a:2b43:126:2946::
Malicious Activity!
Public Scan
Effective URL: http://a0411814.xsph.ru/diaz/users/userID-72643/myaccount/home.php
Submission: On March 07 via api from US
Summary
This is the only time a0411814.xsph.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a00:1450:400... 2a00:1450:4001:821::2001 | 15169 (GOOGLE) (GOOGLE) | |
3 13 | 2a0a:2b43:126... 2a0a:2b43:126:2946:: | 35278 (SPRINTHOST) (SPRINTHOST) | |
1 | 2606:4700::68... 2606:4700::6811:4104 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 152.199.19.160 152.199.19.160 | 15133 (EDGECAST) (EDGECAST) | |
1 | 151.101.1.195 151.101.1.195 | 54113 (FASTLY) (FASTLY) | |
1 | 2a00:86c0:209... 2a00:86c0:2091::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
15 | 6 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
xsph.ru
3 redirects
a0411814.xsph.ru |
101 KB |
1 |
nflxext.com
assets.nflxext.com |
69 KB |
1 |
angularjs.org
code.angularjs.org |
235 KB |
1 |
microsoft.com
ajax.microsoft.com |
7 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
73 KB |
1 |
blogspot.com
mojhalka.blogspot.com |
15 KB |
15 | 6 |
Domain | Requested by | |
---|---|---|
13 | a0411814.xsph.ru |
3 redirects
mojhalka.blogspot.com
a0411814.xsph.ru |
1 | assets.nflxext.com |
a0411814.xsph.ru
|
1 | code.angularjs.org |
a0411814.xsph.ru
|
1 | ajax.microsoft.com |
a0411814.xsph.ru
|
1 | cdnjs.cloudflare.com |
a0411814.xsph.ru
|
1 | mojhalka.blogspot.com | |
15 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleusercontent.com GTS CA 1O1 |
2020-02-12 - 2020-05-06 |
3 months | crt.sh |
cloudflare.com CloudFlare Inc ECC CA-2 |
2020-01-07 - 2020-10-09 |
9 months | crt.sh |
snugg.me Let's Encrypt Authority X3 |
2020-01-22 - 2020-04-21 |
3 months | crt.sh |
*.1.nflxso.net DigiCert SHA2 Secure Server CA |
2020-02-18 - 2020-03-19 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
http://a0411814.xsph.ru/diaz/users/userID-72643/myaccount/home.php
Frame ID: A898F29CE9A9700961D15685A8328D8E
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://mojhalka.blogspot.com/ Page URL
-
http://a0411814.xsph.ru/diaz/
HTTP 302
http://a0411814.xsph.ru/diaz/users/userID-72643 HTTP 301
http://a0411814.xsph.ru/diaz/users/userID-72643/ HTTP 302
http://a0411814.xsph.ru/diaz/users/userID-72643/login/index.php?-EN Page URL
- http://a0411814.xsph.ru/diaz/users/userID-72643/myaccount/home.php Page URL
Detected technologies
Blogger (Blogs) ExpandDetected patterns
- url /^https?:\/\/[^\/]+\.blogspot\.com/i
Python (Programming Languages) Expand
Detected patterns
- url /^https?:\/\/[^\/]+\.blogspot\.com/i
Java (Programming Languages) Expand
Detected patterns
- headers server /GSE/i
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- script /\/([\d.]+(?:-?rc[.\d]*)*)\/angular(?:\.min)?\.js/i
- script /angular.*\.js/i
OpenGSE (Web Servers) Expand
Detected patterns
- headers server /GSE/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://mojhalka.blogspot.com/ Page URL
-
http://a0411814.xsph.ru/diaz/
HTTP 302
http://a0411814.xsph.ru/diaz/users/userID-72643 HTTP 301
http://a0411814.xsph.ru/diaz/users/userID-72643/ HTTP 302
http://a0411814.xsph.ru/diaz/users/userID-72643/login/index.php?-EN Page URL
- http://a0411814.xsph.ru/diaz/users/userID-72643/myaccount/home.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- http://a0411814.xsph.ru/diaz/ HTTP 302
- http://a0411814.xsph.ru/diaz/users/userID-72643 HTTP 301
- http://a0411814.xsph.ru/diaz/users/userID-72643/ HTTP 302
- http://a0411814.xsph.ru/diaz/users/userID-72643/login/index.php?-EN
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
mojhalka.blogspot.com/ |
71 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
a0411814.xsph.ru/diaz/users/userID-72643/login/ Redirect Chain
|
136 B 296 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
home.php
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/ |
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/ |
258 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.js
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/bots/ |
38 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
additional-methods.js
ajax.microsoft.com/ajax/jquery.validate/1.11.1/ |
24 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
angular.js
code.angularjs.org/1.2.20/ |
778 KB 235 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none2.css
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/css/ |
157 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none3.css
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
a0411814.xsph.ru/diaz/users/userID-72643/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugins.js
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/js/ |
55 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Dwissel.js
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon.png
a0411814.xsph.ru/diaz/users/userID-72643/images/ |
37 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
processing.gif
a0411814.xsph.ru/diaz/users/userID-72643/myaccount/images/ |
610 B 850 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-88.woff
assets.nflxext.com/ffe/siteui/fonts/ |
69 KB 69 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| angular0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a0411814.xsph.ru
ajax.microsoft.com
assets.nflxext.com
cdnjs.cloudflare.com
code.angularjs.org
mojhalka.blogspot.com
151.101.1.195
152.199.19.160
2606:4700::6811:4104
2a00:1450:4001:821::2001
2a00:86c0:2091::1
2a0a:2b43:126:2946::
04b8abcbc72d05761c8c52da11074b31e24ed54fbeaa009627eb76361a802776
11abcb5456f0c04c96fc10f9ac83e93c8d625eacf511736ffa8b035dd2ac7955
208994e7418599fbe8296b8b5c8a69736b69e6915aacb9ce8077bb52ce752d11
25bc96ed5dc34d90eb368ea895bc8d5e48c50e782f4fca84d3079f53eb739229
47abb3cb303e5e809a7587683ebd68ace72e98584748086b963b0ca328611bda
6037c8b4d52c20a21dbaec077eb417c7eacc17e5bfe318d6ee2f0f487140cc82
a1ce271ccaeedee2e10babe2ad1f5f26b6b968f2d051f3bea74b5c589d53a2f5
adbd14eb9e143159068565219b797e9877531a07b52acecb4fc532ed703a1e04
ae7c544fb7afa182e29c40467c553ada2af72c9714f50c9418a119cd83319024
b25a2092f0752b754e933008f10213c55dd5ce93a791e355b0abed9182cc8df9
ba892f7903e737d06c952be4ed3266746ed5e1090377fbc5d2ac975626c4533a
c5021196c67154a7a0a1d6c17b8b4bdc5d5ae773f7ff62db74c90abda388eb49
da8d26a43e4892c7134b905155edcff79b722927b839f49e5d081a1f14348147