www.e-theatrum.eu
Open in
urlscan Pro
195.56.42.10
Malicious Activity!
Public Scan
Submission: On December 17 via automatic, source openphish
Summary
This is the only time www.e-theatrum.eu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 195.56.42.10 195.56.42.10 | 5588 (GTSCE GTS...) (GTSCE GTS Central Europe / Antel Germany) | |
8 | 2 |
ASN5588 (GTSCE GTS Central Europe / Antel Germany, CZ)
PTR: kyoto.w5.hu
www.e-theatrum.eu |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
e-theatrum.eu
www.e-theatrum.eu |
45 KB |
0 |
scdn.cf
Failed
scdn.cf Failed |
|
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.e-theatrum.eu |
www.e-theatrum.eu
|
0 | scdn.cf Failed |
www.e-theatrum.eu
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.e-theatrum.eu/Confirmation/mmp/webapps/login.php
Frame ID: (E306F79257AB34863E69CBFFF1309CCC)
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
www.e-theatrum.eu/Confirmation/mmp/webapps/ |
4 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.e-theatrum.eu/Confirmation/mmp/webapps/auth/js/ |
94 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error.css
www.e-theatrum.eu/Confirmation/mmp/webapps/auth/css/ |
7 KB 872 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
www.e-theatrum.eu/Confirmation/mmp/webapps/auth/css/login/ |
28 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.css
www.e-theatrum.eu/Confirmation/mmp/webapps/auth/css/ |
4 KB 987 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js1.js
www.e-theatrum.eu/Confirmation/mmp/webapps/auth/js/ |
626 B 252 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-logo-129x32.svg
www.e-theatrum.eu/Confirmation/mmp/webapps/auth/images/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
logo.png
scdn.cf/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- scdn.cf
- URL
- http://scdn.cf/logo.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint function| $ function| jQuery function| validate object| ray1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.e-theatrum.eu/ | Name: PHPSESSID Value: 1n621vqjijuc05lv35658916fr |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
scdn.cf
www.e-theatrum.eu
scdn.cf
195.56.42.10
19e26e330561626729d65abb540b24ac03d3d4282a5ea5cf63d862f177075abc
3dede67b116e1bfb5bb76a897f6ae4dee0c54d69bed551648b3494ab1a65de57
4b940065e2a67c37e3bd02b23c651f4744a3c219aba2d4fb99a631113494d376
5f4c073b062323868fd31773de4ea33d12d57382d346878074a3510aa4e00a72
8ce84a49877406750d72198074eedcf31f67d050905f53462ab0094cedaa5682
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
bf185d57a19dd41cf8986688296b7acbab6a9d39c5116082e3ccc40a35124a27