pushkino-motors.ru
Open in
urlscan Pro
81.177.135.41
Malicious Activity!
Public Scan
Effective URL: http://pushkino-motors.ru/sitemap/xe/plugins/redid/login.php?cmd=login_submit&id=8e450dc8e5dc92f50dfff29983a13fd68e450dc8e...
Submission: On August 20 via manual from US
Summary
This is the only time pushkino-motors.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 185.27.134.101 185.27.134.101 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
1 5 | 81.177.135.41 81.177.135.41 | 8342 (RTCOMM-AS) (RTCOMM-AS) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a01:7c8:aab9... 2a01:7c8:aab9:4f0::1 | 20857 (TRANSIP-A...) (TRANSIP-AS Amsterdam) | |
1 | 104.20.13.105 104.20.13.105 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
9 | 5 |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: 10113427185.ifastnet.org
ofiihrncaoi.rf.gd |
ASN20857 (TRANSIP-AS Amsterdam, the Netherlands, NL)
static.afbeeldinguploaden.nl |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
image.prntscr.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
pushkino-motors.ru
1 redirects
pushkino-motors.ru |
298 KB |
3 |
rf.gd
1 redirects
ofiihrncaoi.rf.gd |
32 KB |
1 |
prntscr.com
image.prntscr.com |
1 KB |
1 |
afbeeldinguploaden.nl
static.afbeeldinguploaden.nl |
1 KB |
1 |
gfx.ms
auth.gfx.ms |
17 KB |
9 | 5 |
Domain | Requested by | |
---|---|---|
5 | pushkino-motors.ru |
1 redirects
ofiihrncaoi.rf.gd
pushkino-motors.ru |
3 | ofiihrncaoi.rf.gd |
1 redirects
ofiihrncaoi.rf.gd
|
1 | image.prntscr.com |
pushkino-motors.ru
|
1 | static.afbeeldinguploaden.nl |
pushkino-motors.ru
|
1 | auth.gfx.ms |
pushkino-motors.ru
|
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
msagfx.live.com Microsoft IT TLS CA 4 |
2017-07-27 - 2019-07-17 |
2 years | crt.sh |
afbeeldinguploaden.nl Let's Encrypt Authority X3 |
2018-08-07 - 2018-11-05 |
3 months | crt.sh |
ssl366238.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-07-09 - 2019-01-15 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://pushkino-motors.ru/sitemap/xe/plugins/redid/login.php?cmd=login_submit&id=8e450dc8e5dc92f50dfff29983a13fd68e450dc8e5dc92f50dfff29983a13fd6&session=8e450dc8e5dc92f50dfff29983a13fd68e450dc8e5dc92f50dfff29983a13fd6
Frame ID: 3BA811623C3BA98F8AE992DB2B9DBB36
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://ofiihrncaoi.rf.gd/ Page URL
-
http://ofiihrncaoi.rf.gd/?i=1
HTTP 301
http://pushkino-motors.ru/sitemap/xe/plugins/redid/index.php?i=1 HTTP 302
http://pushkino-motors.ru/sitemap/xe/plugins/redid/login.php?cmd=login_submit&id=8e450dc8e5dc92f50dfff... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://ofiihrncaoi.rf.gd/ Page URL
-
http://ofiihrncaoi.rf.gd/?i=1
HTTP 301
http://pushkino-motors.ru/sitemap/xe/plugins/redid/index.php?i=1 HTTP 302
http://pushkino-motors.ru/sitemap/xe/plugins/redid/login.php?cmd=login_submit&id=8e450dc8e5dc92f50dfff29983a13fd68e450dc8e5dc92f50dfff29983a13fd6&session=8e450dc8e5dc92f50dfff29983a13fd68e450dc8e5dc92f50dfff29983a13fd6 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
ofiihrncaoi.rf.gd/ |
828 B 827 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aes.js
ofiihrncaoi.rf.gd/ |
30 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
pushkino-motors.ru/sitemap/xe/plugins/redid/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged1036.css
auth.gfx.ms/16.000.27457.501/ |
85 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
pushkino-motors.ru/sitemap/xe/plugins/redid/data_files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pcd0TILb.png
static.afbeeldinguploaden.nl/1803/376435/ |
904 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
OHnQlgv3RI2NJHnv1105XQ.png
image.prntscr.com/image/ |
772 B 1 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
pushkino-motors.ru/sitemap/xe/plugins/redid/data_files/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
pushkino-motors.ru/sitemap/xe/plugins/redid/data_files/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
image.prntscr.com
ofiihrncaoi.rf.gd
pushkino-motors.ru
static.afbeeldinguploaden.nl
104.20.13.105
185.27.134.101
2a01:7c8:aab9:4f0::1
2a02:26f0:6c00:283::34ef
81.177.135.41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