www.sbuclts.com
Open in
urlscan Pro
162.144.64.206
Malicious Activity!
Public Scan
Effective URL: https://www.sbuclts.com/v12.php?e=brian.moldon@walthammforessst.gov.uk
Submission: On October 04 via manual from GB
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 2nd 2018. Valid for: 3 months.
This is the only time www.sbuclts.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 27.124.124.97 27.124.124.97 | 38719 (DREAMSCAP...) (DREAMSCAPE-AS-AP Dreamscape Networks Limited) | |
1 | 162.144.64.206 162.144.64.206 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
4 | 4 |
ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU)
PTR: arcs.ht.dstier2.com
www.ramizkharoufeh.com |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 162-144-64-206.unifiedlayer.com
www.sbuclts.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
stackpath.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
35 KB |
1 |
sbuclts.com
www.sbuclts.com |
21 KB |
1 |
ramizkharoufeh.com
www.ramizkharoufeh.com |
352 B |
0 |
Failed
function sub() { [native code] }. Failed |
|
4 | 4 |
Domain | Requested by | |
---|---|---|
2 | stackpath.bootstrapcdn.com |
www.sbuclts.com
|
1 | www.sbuclts.com | |
1 | www.ramizkharoufeh.com | |
0 | truncated Failed |
www.sbuclts.com
|
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sbuclts.com cPanel, Inc. Certification Authority |
2018-10-02 - 2018-12-31 |
3 months | crt.sh |
*.bootstrapcdn.com Let's Encrypt Authority X3 |
2018-09-14 - 2018-12-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.sbuclts.com/v12.php?e=brian.moldon@walthammforessst.gov.uk
Frame ID: EFA80D2F248C4BF1559C3920522EE621
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.ramizkharoufeh.com/qs.php?e=brian.moldon@walthammforessst.gov.uk Page URL
- https://www.sbuclts.com/v12.php?e=brian.moldon@walthammforessst.gov.uk Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.ramizkharoufeh.com/qs.php?e=brian.moldon@walthammforessst.gov.uk Page URL
- https://www.sbuclts.com/v12.php?e=brian.moldon@walthammforessst.gov.uk Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
qs.php
www.ramizkharoufeh.com/ |
117 B 352 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
v12.php
www.sbuclts.com/ |
21 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.1.3/css/ |
138 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
truncated
/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- truncated
- URL
- data:truncated
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| bootstrap function| clkLgn0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
stackpath.bootstrapcdn.com
truncated
www.ramizkharoufeh.com
www.sbuclts.com
truncated
162.144.64.206
209.197.3.15
27.124.124.97
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
659befb19d33960267aebdb210b47376db089e283f1011a25ee968db3306dca4
7928b5ab63c6e89ee0ee26f5ef201a58c72baf91abb688580a1aa26eb57b3c11
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b