aquaheart.net
Open in
urlscan Pro
69.49.235.19
Malicious Activity!
Public Scan
Submission Tags: tweet @pingineer_jp #phishingsite #phishingkit #phishing #scam #rbfcu Search All
Submission: On March 17 via api from FI — Scanned from FI
Summary
This is the only time aquaheart.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Randolph Brooks Federal Credit Union (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 69.49.235.19 69.49.235.19 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 | 143.204.89.51 143.204.89.51 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:80e::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:812::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 | 143.204.89.10 143.204.89.10 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 54.68.85.161 54.68.85.161 | 16509 (AMAZON-02) (AMAZON-02) | |
17 | 6 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 69-49-235-19.webhostbox.net
aquaheart.net |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-89-51.fra50.r.cloudfront.net
cdn.appdynamics.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-89-10.fra50.r.cloudfront.net
cdn.appdynamics.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-68-85-161.us-west-2.compute.amazonaws.com
col.eum-appdynamics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
aquaheart.net
aquaheart.net |
557 KB |
2 |
appdynamics.com
cdn.appdynamics.com — Cisco Umbrella Rank: 3515 |
61 KB |
1 |
eum-appdynamics.com
col.eum-appdynamics.com — Cisco Umbrella Rank: 2800 |
732 B |
1 |
gstatic.com
fonts.gstatic.com |
16 KB |
1 |
googleapis.com
maps.googleapis.com — Cisco Umbrella Rank: 351 |
355 B |
17 | 5 |
Domain | Requested by | |
---|---|---|
12 | aquaheart.net |
aquaheart.net
|
2 | cdn.appdynamics.com |
aquaheart.net
cdn.appdynamics.com |
1 | col.eum-appdynamics.com |
cdn.appdynamics.com
|
1 | fonts.gstatic.com |
aquaheart.net
|
1 | maps.googleapis.com |
aquaheart.net
|
17 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.appdynamics.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-07-17 - 2023-07-22 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-03-02 - 2023-05-25 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-03-02 - 2023-05-25 |
3 months | crt.sh |
*.eum-appdynamics.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-14 - 2023-07-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://aquaheart.net/rbfcu/rbfcu/index.php
Frame ID: D83A44E14AC64A1BC7BD850FC6B7992A
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
RBFCU - Sign InDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
AppDynamics (Analytics) Expand
Detected patterns
- adrum
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
aquaheart.net/rbfcu/rbfcu/ |
50 KB 50 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon
aquaheart.net/rbfcu/rbfcu/assets/css/ |
569 B 786 B |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
aquaheart.net/rbfcu/rbfcu/assets/css/ |
25 KB 25 KB |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css(1)
aquaheart.net/rbfcu/rbfcu/assets/css/ |
6 KB 6 KB |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css(2)
aquaheart.net/rbfcu/rbfcu/assets/css/ |
10 KB 11 KB |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chat-bundle.css
aquaheart.net/rbfcu/rbfcu/assets/css/ |
532 B 773 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.f1c83d5267fd564adeae.css
aquaheart.net/rbfcu/rbfcu/assets/css/ |
190 KB 190 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js
aquaheart.net/rbfcu/rbfcu/assets/js/ |
163 KB 163 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adrum-latest.js
cdn.appdynamics.com/adrum/ |
110 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rbfcu-logo.svg
aquaheart.net/rbfcu/rbfcu/assets/img/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NCUA-logo-gray.svg
aquaheart.net/rbfcu/rbfcu/assets/img/ |
102 KB 102 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EHL-logo-gray.svg
aquaheart.net/rbfcu/rbfcu/assets/img/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gen_204
maps.googleapis.com/maps/api/mapsjs/ |
3 B 355 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white-phone-header.4a066fd87a48426d8cf5.svg
aquaheart.net/online/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adrum-ext.bb4998b9fa08203795298c5909e8245d.js
cdn.appdynamics.com/ |
53 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
adrum
col.eum-appdynamics.com/eumcollector/beacons/browser/v1/APP_KEY_NOT_SET/ |
0 732 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Randolph Brooks Federal Credit Union (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| google object| module$exports$mapsapi$util$event object| module$contents$mapsapi$overlay$overlayView_OverlayView object| ADRUM number| adrum-start-time0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aquaheart.net
cdn.appdynamics.com
col.eum-appdynamics.com
fonts.gstatic.com
maps.googleapis.com
143.204.89.10
143.204.89.51
2a00:1450:4001:80e::200a
2a00:1450:4001:812::2003
54.68.85.161
69.49.235.19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