rollatortests.com
Open in
urlscan Pro
2606:4700:3035::681c:10d
Malicious Activity!
Public Scan
Submission: On October 14 via api from US
Summary
This is the only time rollatortests.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2606:4700:303... 2606:4700:3035::681c:10d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 185.224.137.179 185.224.137.179 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
9 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
rollatortests.com
rollatortests.com |
52 KB |
1 |
ccscdn.li
cdn.ccscdn.li |
3 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | rollatortests.com |
rollatortests.com
|
1 | cdn.ccscdn.li |
rollatortests.com
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://rollatortests.com/hodllasfaxbot/login.php?ss=2&ea=66c796e647365792e70726963654066676c73706f7274732e636f6d
Frame ID: CFB5B7BAFB66041B2F77F43AAD9385D6
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
rollatortests.com/hodllasfaxbot/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged1033.css
rollatortests.com/hodllasfaxbot/files/ |
98 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ou.png
rollatortests.com/hodllasfaxbot/files2/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
rollatortests.com/hodllasfaxbot/files/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left.png
rollatortests.com/hodllasfaxbot/files/ |
240 B 847 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email-decode.min.js
rollatortests.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9fd503cf407e806f9db831faaf3ab8d114af28.css
cdn.ccscdn.li/odn/ |
15 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-small.jpg
rollatortests.com/hodllasfaxbot/files2/ |
987 B 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpg
rollatortests.com/hodllasfaxbot/files2/ |
17 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| empty function| change function| myFunction2 function| myFunction object| form object| button2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rollatortests.com/ | Name: PHPSESSID Value: b37657e56425126cf173e2599017a91f |
|
.rollatortests.com/ | Name: __cfduid Value: d2973e2c513929d26f325b1ca76e381ac1602698005 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.ccscdn.li
rollatortests.com
185.224.137.179
2606:4700:3035::681c:10d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