paxtachi.uz
Open in
urlscan Pro
195.158.11.99
Malicious Activity!
Public Scan
Effective URL: http://paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login.php?&sessionid=65a89d51...
Submission: On September 25 via manual from US
Summary
This is the only time paxtachi.uz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 195.158.11.99 195.158.11.99 | 8193 (BRM) (BRM) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 | 2.18.233.89 2.18.233.89 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
12 | 3 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
paxtachi.uz
1 redirects
paxtachi.uz |
147 KB |
2 |
rackcdn.com
8f544770ae5b7cfb8345-6636004133269479b2733e2a336860f6.ssl.cf2.rackcdn.com |
688 B |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | paxtachi.uz |
1 redirects
paxtachi.uz
|
2 | 8f544770ae5b7cfb8345-6636004133269479b2733e2a336860f6.ssl.cf2.rackcdn.com |
paxtachi.uz
|
1 | www.sitepoint.com |
paxtachi.uz
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sitepoint.com SSL.com Premium EV CA |
2018-08-07 - 2019-09-23 |
a year | crt.sh |
*.ssl.cf2.rackcdn.com DigiCert SHA2 Secure Server CA |
2018-03-19 - 2019-03-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true
Frame ID: ED4151A797427FC9BFACB6F7382A7FFF
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/index.php
HTTP 302
http://paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login.php... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Debian (Operating Systems) Expand
Detected patterns
- headers server /Debian/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/index.php
HTTP 302
http://paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login.php?&sessionid=65a89d51a74c843ac913134976da73e8&securessl=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modal.js
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
14 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap_ext.css
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
603 KB 79 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
custom_olb.css
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
576 KB 60 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
anim-in-out.css
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
8 KB 958 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background_day_IN_high.jpg
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
19 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
v4llpaneltoggler.png
8f544770ae5b7cfb8345-6636004133269479b2733e2a336860f6.ssl.cf2.rackcdn.com//rely/resources/images/v4llpanel/ |
0 344 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
v4llpanellogo.png
8f544770ae5b7cfb8345-6636004133269479b2733e2a336860f6.ssl.cf2.rackcdn.com//rely/resources/images/v4llpanel/ |
0 344 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
530dee22-e3c1-4e9f-bf62-c31d510d9656.woff
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
17 KB 0 |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keybank-icons.ttf
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
18 KB 0 |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
14ff6081-326d-4dae-b778-d7afa66166fc.woff
paxtachi.uz/sites/default/navigatornew/navigator/navigator/navigator/navigator/login_files/ |
18 KB 0 |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MsgBox function| YesNo function| YesNoCancel function| JavaScriptError function| empty function| MaskedPassword0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
8f544770ae5b7cfb8345-6636004133269479b2733e2a336860f6.ssl.cf2.rackcdn.com
paxtachi.uz
www.sitepoint.com
195.158.11.99
2.18.233.89
54.148.84.95
19a6ca895a160f34f86cde6c0a881edca81385e936482049ac94986889428f90
2cfdb08c07395b0be65df154f068ade61c1bfad7e3e3e2d0e40b85319fa95825
548b5dc067c50c852450a4e32376873df20420d6159867de7312ec6f95c538e7
7e7990c00e976409fc975666bd243ab1118ece2414d00e4eded9ae0a10842177
840759b0c3cc29cae41ddd56c5a818e64d7112b66cc50f5628882c992e145e19
8521048ffd2659447d3335e3444efa75ad217a6b865026a3a8d8a77351391d8f
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855