reasonbarkhelproot.icu
Open in
urlscan Pro
2606:4700:30::681c:1165
Malicious Activity!
Public Scan
Submission: On December 05 via api from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on December 4th 2018. Valid for: a year.
This is the only time reasonbarkhelproot.icu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Generic (Online) Tech Support Scam (Consumer)Downloads These files were downloaded by the website
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:30:... 2606:4700:30::681c:1165 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2606:4700::68... 2606:4700::6813:c797 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
15 | 6 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
reasonbarkhelproot.icu |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
ajax.cloudflare.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
reasonbarkhelproot.icu
reasonbarkhelproot.icu |
127 KB |
2 |
jquery.com
code.jquery.com |
60 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
22 KB |
1 |
googleapis.com
fonts.googleapis.com |
3 KB |
1 |
cloudflare.com
ajax.cloudflare.com |
4 KB |
15 | 5 |
Domain | Requested by | |
---|---|---|
7 | reasonbarkhelproot.icu |
reasonbarkhelproot.icu
ajax.cloudflare.com |
2 | code.jquery.com |
ajax.cloudflare.com
|
2 | maxcdn.bootstrapcdn.com |
reasonbarkhelproot.icu
|
1 | fonts.googleapis.com |
reasonbarkhelproot.icu
|
1 | ajax.cloudflare.com |
reasonbarkhelproot.icu
|
15 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2018-12-04 - 2019-12-04 |
a year | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-09-22 - 2019-03-31 |
6 months | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2018-11-07 - 2019-01-30 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://reasonbarkhelproot.icu/1.12/jp.php
Frame ID: 0750FE6279D06F6941859B1E79BD15B3
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
jp.php
reasonbarkhelproot.icu/1.12/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
bootstrap-theme.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
23 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
reasonbarkhelproot.icu/1.12/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rocket-loader.min.js
ajax.cloudflare.com/cdn-cgi/scripts/2448a7bd/cloudflare-static/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
support.svg
reasonbarkhelproot.icu/1.12/images/ |
16 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
335158-windows-8-window.png
reasonbarkhelproot.icu/1.12/images/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
33 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.png
reasonbarkhelproot.icu/1.12/images/ |
71 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
239 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sound.mp3
reasonbarkhelproot.icu/1.12/assets/audio/ |
17 KB 17 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
reasonbarkhelproot.icu/1.12/js/ |
2 KB 804 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-3.3.1.min.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-3.3.1.min.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- code.jquery.com
- URL
- http://code.jquery.com/jquery-3.3.1.min.js
- Domain
- code.jquery.com
- URL
- http://code.jquery.com/jquery-3.3.1.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Generic (Online) Tech Support Scam (Consumer)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| isOpera boolean| isFirefox boolean| isSafari boolean| isChrome boolean| isIE object| __cfQR function| $ function| jQuery function| _toggleFullScreen function| open1 function| isPlaying function| forceDownload function| catchControlKeys function| prevent boolean| state function| confirmExit function| get_browser boolean| InternetEx boolean| isIEedge object| browser undefined| msg_ff1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.reasonbarkhelproot.icu/ | Name: __cfduid Value: d719457c214bd57162bdce546edbed2fc1544016039 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.cloudflare.com
code.jquery.com
fonts.googleapis.com
maxcdn.bootstrapcdn.com
reasonbarkhelproot.icu
code.jquery.com
205.185.208.52
209.197.3.15
2606:4700:30::681c:1165
2606:4700::6813:c797
2a00:1450:4001:81f::200a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