jklm6.ru.com
Open in
urlscan Pro
162.241.69.105
Malicious Activity!
Public Scan
Effective URL: https://jklm6.ru.com/avr/dup-mai/Dir/Connexion.php
Submission: On August 31 via api from US — Scanned from FR
Summary
TLS certificate: Issued by R3 on August 10th 2023. Valid for: 3 months.
This is the only time jklm6.ru.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Orange (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 15.204.49.211 15.204.49.211 | 16276 (OVH) (OVH) | |
5 | 162.241.69.105 162.241.69.105 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 1 | 2606:4700:20:... 2606:4700:20::ac43:4bab | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 3 |
ASN16276 (OVH, FR)
PTR: ip211.ip-15-204-49.us
louavin.com |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 162-241-69-105.webhostbox.net
jklm6.ru.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
ru.com
jklm6.ru.com |
68 KB |
2 |
louavin.com
1 redirects
louavin.com |
522 B |
1 |
jquery.app
jquery.app — Cisco Umbrella Rank: 117172 |
1 KB |
1 |
jqueryscript.net
1 redirects
www.jqueryscript.net — Cisco Umbrella Rank: 85811 |
490 B |
7 | 4 |
Domain | Requested by | |
---|---|---|
5 | jklm6.ru.com |
louavin.com
jklm6.ru.com |
2 | louavin.com | 1 redirects |
1 | jquery.app |
jklm6.ru.com
|
1 | www.jqueryscript.net | 1 redirects |
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
louavin.com R3 |
2023-08-25 - 2023-11-23 |
3 months | crt.sh |
jklm6.ru.com R3 |
2023-08-10 - 2023-11-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jklm6.ru.com/avr/dup-mai/Dir/Connexion.php
Frame ID: 007C0862DCE8DD68146DDC519C1F7E1A
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Accéder à mes comptes en lignePage URL History Show full URLs
-
http://louavin.com/
HTTP 301
https://louavin.com/ Page URL
- https://jklm6.ru.com/avr/dup-mai/Dir/Connexion.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://louavin.com/
HTTP 301
https://louavin.com/ Page URL
- https://jklm6.ru.com/avr/dup-mai/Dir/Connexion.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://louavin.com/ HTTP 301
- https://louavin.com/
- https://www.jqueryscript.net/css/jquerysctipttop.css HTTP 302
- https://jquery.app/jqueryscripttop.css
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
louavin.com/ Redirect Chain
|
239 B 334 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Connexion.php
jklm6.ru.com/avr/dup-mai/Dir/ |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jqueryscripttop.css
jquery.app/ Redirect Chain
|
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
image.css
jklm6.ru.com/avr/dup-mai/Dir/files/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
back.PNG
jklm6.ru.com/avr/dup-mai/Dir/files/ |
37 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
indiquer.PNG
jklm6.ru.com/avr/dup-mai/Dir/files/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
comment.PNG
jklm6.ru.com/avr/dup-mai/Dir/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Orange (Telecommunication)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| showHide1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jklm6.ru.com/ | Name: PHPSESSID Value: b2a16d155f6c5977df4155f21f3edfd9 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jklm6.ru.com
jquery.app
louavin.com
www.jqueryscript.net
15.204.49.211
162.241.69.105
2606:4700:20::ac43:4bab
2a06:98c1:3120::3
324f173a65affdc2506935ac2f7b61ca136877a8f3116e92a294fd2259c26b41
69e964fbc7987cbef8e5c3d461820a31e178de2dfe4fbc66879cd294aecca072
7f752438291e281d4351434ef92bd2c7699d73530b5aa272e5ca37e4e6ba4a66
9705cd86bd3c80505ba34630f14a1efad2b8e48a006a8cef97f07dfa268b741a
c5ae5e3c57049849d2ad9a2a93c6a627849680e4a8c6662367ca732632fca90f
e3b0e0237bf6b1458df79276c75bd5b5ce15691a20d82a47f422a04f2cf2f1d4