archiv.roslesprof.ru
Open in
urlscan Pro
188.170.33.69
Malicious Activity!
Public Scan
Effective URL: http://archiv.roslesprof.ru//.quarantine/-/login.php?cmd=login_submit&id=c4fa74f20f09c8ae34fb863a5746e89bc4fa74f20f09c8ae34f...
Submission: On January 18 via manual from US — Scanned from DE
Summary
This is the only time archiv.roslesprof.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 188.170.33.69 188.170.33.69 | 25159 (SONICDUO-AS) (SONICDUO-AS) | |
1 1 | 2600:9000:225... 2600:9000:2250:9800:10:7abf:f800:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:50c0:800... 2606:50c0:8000::153 | 54113 (FASTLY) (FASTLY) | |
1 9 | 151.101.112.193 151.101.112.193 | 54113 (FASTLY) (FASTLY) | |
1 2 | 192.186.220.3 192.186.220.3 | 398101 (GO-DADDY-...) (GO-DADDY-COM-LLC) | |
11 | 4 |
ASN25159 (SONICDUO-AS, RU)
PTR: clients-69.33.170.188.misp.ru
archiv.roslesprof.ru |
ASN398101 (GO-DADDY-COM-LLC, US)
PTR: ip-192-186-220-3.ip.secureserver.net
csscheckbox.com | |
www.csscheckbox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
imgur.com
1 redirects
i.imgur.com — Cisco Umbrella Rank: 5174 |
646 KB |
2 |
csscheckbox.com
1 redirects
csscheckbox.com www.csscheckbox.com |
1 KB |
2 |
sitepoint.com
1 redirects
www.sitepoint.com — Cisco Umbrella Rank: 228477 i2.sitepoint.com |
6 KB |
2 |
roslesprof.ru
1 redirects
archiv.roslesprof.ru |
3 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
9 | i.imgur.com |
1 redirects
archiv.roslesprof.ru
|
2 | archiv.roslesprof.ru | 1 redirects |
1 | www.csscheckbox.com |
archiv.roslesprof.ru
|
1 | csscheckbox.com | 1 redirects |
1 | i2.sitepoint.com |
archiv.roslesprof.ru
|
1 | www.sitepoint.com | 1 redirects |
11 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://archiv.roslesprof.ru//.quarantine/-/login.php?cmd=login_submit&id=c4fa74f20f09c8ae34fb863a5746e89bc4fa74f20f09c8ae34fb863a5746e89b&session=c4fa74f20f09c8ae34fb863a5746e89bc4fa74f20f09c8ae34fb863a5746e89b
Frame ID: 20F211A9B9DD316AAE7C6D5851ADEB3F
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
Login to MyADPPage URL History Show full URLs
-
http://archiv.roslesprof.ru//.quarantine/-/
HTTP 302
http://archiv.roslesprof.ru//.quarantine/-/login.php?cmd=login_submit&id=c4fa74f20f09c8ae34fb863a5746e89... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://archiv.roslesprof.ru//.quarantine/-/
HTTP 302
http://archiv.roslesprof.ru//.quarantine/-/login.php?cmd=login_submit&id=c4fa74f20f09c8ae34fb863a5746e89bc4fa74f20f09c8ae34fb863a5746e89b&session=c4fa74f20f09c8ae34fb863a5746e89bc4fa74f20f09c8ae34fb863a5746e89b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://www.sitepoint.com/examples/password/MaskedPassword/MaskedPassword.js HTTP 301
- https://i2.sitepoint.com/examples/password/MaskedPassword/MaskedPassword.js
- http://i.imgur.com/CHDtopw.png HTTP 301
- https://i.imgur.com/CHDtopw.png
- http://i.imgur.com/2E9Thoi.png HTTP 307
- https://i.imgur.com/2E9Thoi.png
- http://i.imgur.com/PCYvxpz.png HTTP 307
- https://i.imgur.com/PCYvxpz.png
- http://i.imgur.com/84UDxFn.png HTTP 307
- https://i.imgur.com/84UDxFn.png
- http://i.imgur.com/OvxPHgR.png HTTP 307
- https://i.imgur.com/OvxPHgR.png
- http://i.imgur.com/ThHd3Zs.png HTTP 307
- https://i.imgur.com/ThHd3Zs.png
- http://i.imgur.com/b5bSQZG.png HTTP 307
- https://i.imgur.com/b5bSQZG.png
- http://i.imgur.com/e2y12Hk.png HTTP 307
- https://i.imgur.com/e2y12Hk.png
- http://csscheckbox.com/checkboxes/u/csscheckbox_5afcb5d2e7354c56bebd57df41210852.png HTTP 301
- http://www.csscheckbox.com/checkboxes/u/csscheckbox_5afcb5d2e7354c56bebd57df41210852.png
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
archiv.roslesprof.ru//.quarantine/-/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MaskedPassword.js
i2.sitepoint.com/examples/password/MaskedPassword/ Redirect Chain
|
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CHDtopw.png
i.imgur.com/ Redirect Chain
|
205 KB 205 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2E9Thoi.png
i.imgur.com/ Redirect Chain
|
257 KB 257 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PCYvxpz.png
i.imgur.com/ Redirect Chain
|
176 KB 176 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
84UDxFn.png
i.imgur.com/ Redirect Chain
|
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OvxPHgR.png
i.imgur.com/ Redirect Chain
|
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ThHd3Zs.png
i.imgur.com/ Redirect Chain
|
386 B 701 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b5bSQZG.png
i.imgur.com/ Redirect Chain
|
294 B 441 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e2y12Hk.png
i.imgur.com/ Redirect Chain
|
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csscheckbox_5afcb5d2e7354c56bebd57df41210852.png
www.csscheckbox.com/checkboxes/u/ Redirect Chain
|
472 B 812 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
archiv.roslesprof.ru
csscheckbox.com
i.imgur.com
i2.sitepoint.com
www.csscheckbox.com
www.sitepoint.com
151.101.112.193
188.170.33.69
192.186.220.3
2600:9000:2250:9800:10:7abf:f800:93a1
2606:50c0:8000::153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