stagingwm.com
Open in
urlscan Pro
67.222.138.74
Malicious Activity!
Public Scan
Effective URL: https://stagingwm.com/doc/login.php?cmd=login_submit&id=6bc25db06cacc753308603bdb045d7c66bc25db06cacc753308603bdb045d7...
Submission: On May 09 via manual from GB
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 20th 2019. Valid for: 3 months.
This is the only time stagingwm.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DocuSign (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 45.40.140.1 45.40.140.1 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
1 11 | 67.222.138.74 67.222.138.74 | 393398 (ASN-DIS) (ASN-DIS - Dallas Infrastructure Services) | |
10 | 1 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-45-40-140-1.ip.secureserver.net
x.co |
ASN393398 (ASN-DIS - Dallas Infrastructure Services, LLC, US)
PTR: wmhost.odendev.com
stagingwm.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
stagingwm.com
1 redirects
stagingwm.com |
93 KB |
2 |
x.co
2 redirects
x.co |
289 B |
10 | 2 |
Domain | Requested by | |
---|---|---|
11 | stagingwm.com |
1 redirects
stagingwm.com
|
2 | x.co | 2 redirects |
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
stagingwm.com cPanel, Inc. Certification Authority |
2019-03-20 - 2019-06-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://stagingwm.com/doc/login.php?cmd=login_submit&id=6bc25db06cacc753308603bdb045d7c66bc25db06cacc753308603bdb045d7c6&session=6bc25db06cacc753308603bdb045d7c66bc25db06cacc753308603bdb045d7c6
Frame ID: F8D3719AA9934BE60A850D821DB053BA
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://x.co/6nnyG
HTTP 301
https://x.co/6nnyG HTTP 302
https://stagingwm.com/doc/index.php HTTP 302
https://stagingwm.com/doc/login.php?cmd=login_submit&id=6bc25db06cacc753308603bdb045d7c66bc25db06c... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://x.co/6nnyG
HTTP 301
https://x.co/6nnyG HTTP 302
https://stagingwm.com/doc/index.php HTTP 302
https://stagingwm.com/doc/login.php?cmd=login_submit&id=6bc25db06cacc753308603bdb045d7c66bc25db06cacc753308603bdb045d7c6&session=6bc25db06cacc753308603bdb045d7c66bc25db06cacc753308603bdb045d7c6 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
stagingwm.com/doc/ Redirect Chain
|
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d1.png
stagingwm.com/doc/images/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p1.png
stagingwm.com/doc/images/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d3.png
stagingwm.com/doc/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dal.png
stagingwm.com/doc/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dof.png
stagingwm.com/doc/images/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
doth.png
stagingwm.com/doc/images/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gl.png
stagingwm.com/doc/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
z1.png
stagingwm.com/doc/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d4.png
stagingwm.com/doc/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DocuSign (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
stagingwm.com
x.co
45.40.140.1
67.222.138.74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