rs8.rcnoc.com
Open in
urlscan Pro
142.132.134.47
Malicious Activity!
Public Scan
Effective URL: https://rs8.rcnoc.com/~sasumuaa/css/B.php?cred=1
Submission: On October 11 via manual from CO — Scanned from US
Summary
TLS certificate: Issued by R11 on August 29th 2024. Valid for: 3 months.
This is the only time rs8.rcnoc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 167.235.180.68 167.235.180.68 | 24940 (HETZNER-AS) (HETZNER-AS) | |
18 | 142.132.134.47 142.132.134.47 | 24940 (HETZNER-AS) (HETZNER-AS) | |
18 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
rcnoc.com
2 redirects
rs1.rcnoc.com rs8.rcnoc.com |
260 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
18 | rs8.rcnoc.com |
rs8.rcnoc.com
|
2 | rs1.rcnoc.com | 2 redirects |
18 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
rs8.rcnoc.com R11 |
2024-08-29 - 2024-11-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rs8.rcnoc.com/~sasumuaa/css/B.php?cred=1
Frame ID: FCBB6B27512E2C67E29436ECCF63FA95
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
| DHL |Page URL History Show full URLs
-
https://rs1.rcnoc.com/~chatafri/.well-known/acme-challenge
HTTP 301
https://rs1.rcnoc.com/~chatafri/.well-known/acme-challenge/ HTTP 302
https://rs8.rcnoc.com/~sasumuaa/css/B.php?cred=1 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rs1.rcnoc.com/~chatafri/.well-known/acme-challenge
HTTP 301
https://rs1.rcnoc.com/~chatafri/.well-known/acme-challenge/ HTTP 302
https://rs8.rcnoc.com/~sasumuaa/css/B.php?cred=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
B.php
rs8.rcnoc.com/~sasumuaa/css/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
rs8.rcnoc.com/~sasumuaa/css/X31/css/ |
152 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
rs8.rcnoc.com/~sasumuaa/css/X31/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
rs8.rcnoc.com/~sasumuaa/css/X31/css/ |
13 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-icons.css
rs8.rcnoc.com/~sasumuaa/css/X31/css/ |
64 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dhl-logo.svg
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
2 KB 704 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LOGA.svg
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
1 KB 845 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LOGAA.svg
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
camion.png
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vmx.png
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
group.svg
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
12 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
socio.png
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.1.min.js
rs8.rcnoc.com/~sasumuaa/css/X31/js/ |
88 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
rs8.rcnoc.com/~sasumuaa/css/X31/js/ |
77 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.min.js
rs8.rcnoc.com/~sasumuaa/css/X31/js/ |
8 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
titiza.png
rs8.rcnoc.com/~sasumuaa/css/X31/css/ |
10 KB 10 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap-icons.woff2
rs8.rcnoc.com/~sasumuaa/css/X31/css/ |
83 KB 83 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
rs8.rcnoc.com/~sasumuaa/css/X31/img/ |
1 KB 351 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| uidEvent object| bootstrap object| $jscomp2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rs1.rcnoc.com/ | Name: PHPSESSID Value: 8940977b6c32e62a438e539b73cd699c |
|
rs8.rcnoc.com/ | Name: PHPSESSID Value: d23aeb145e9ae0eb48953e0c03aaf81b |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
rs1.rcnoc.com
rs8.rcnoc.com
142.132.134.47
167.235.180.68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