irs-g0v.org
Open in
urlscan Pro
104.37.185.188
Malicious Activity!
Public Scan
Submission: On June 07 via automatic, source phishtank
Summary
This is the only time irs-g0v.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: IRS (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 104.37.185.188 104.37.185.188 | 19318 (IS-AS-1) (IS-AS-1) | |
22 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
irs-g0v.org
irs-g0v.org |
219 KB |
22 | 1 |
Domain | Requested by | |
---|---|---|
22 | irs-g0v.org |
irs-g0v.org
|
22 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://irs-g0v.org/coronavirus/notice/pre-qualify.html
Frame ID: 98EA57460650F054B45AB63BA2D6AE64
Requests: 22 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
pre-qualify.html
irs-g0v.org/coronavirus/notice/ |
34 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/bootstrap/4.3.1/css/ |
152 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.min.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/commons-web/jquery-ui/1.12.1/ |
31 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
irs.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-error.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/css/ |
786 B 673 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
irs-g0v.org/coronavirus/notice/irfof-wmsp/commons-web/jquery/3.4.1/ |
86 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.min.js
irs-g0v.org/coronavirus/notice/irfof-wmsp/commons-web/jquery-ui/1.12.1/ |
248 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/bootstrap/4.3.1/js/ |
57 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wmsp-shared-secrets.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/resources/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wmsp-results.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/resources/css/ |
2 KB 987 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datepicker.css
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/css/ |
21 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datepicker.min.js
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/js/ |
65 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flag.png
irs-g0v.org/coronavirus/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
irs_horiz_white.png
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
expire.js
irs-g0v.org/coronavirus/notice/irfof-wmsp/commons-web/expire/2.0.0/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a05a9dd08no22348569aada632df3ba
irs-g0v.org/coronavirus/notice/clientlibs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
swirl_lighter_ca6f4deb.png
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
us-flag_b22a832d.png
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ac93c75f139d8d6cf03fd24ddcc996ce.woff2
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
939d9f66e993332d8def74508fe62a33.woff
irs-g0v.org/coronavirus/notice/irfof-wmsp/webjars/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: IRS (Government)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| bootstrap object| expireManager function| logout function| sessionTimeout boolean| timeoutView boolean| logoutView object| _cf0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
irs-g0v.org
104.37.185.188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