officersguide.ml
Open in
urlscan Pro
37.120.146.93
Malicious Activity!
Public Scan
Effective URL: http://officersguide.ml/rackspaceauto/r/66w1500gslmk3wwqtu9sjop9.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&...
Submission: On March 20 via api from CA
Summary
This is the only time officersguide.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Rackspace (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 37.120.146.93 37.120.146.93 | 9009 (M247) (M247) | |
2 4 | 2001:4802:7a0... 2001:4802:7a01:10::7 | 27357 (RACKSPACE) (RACKSPACE - Rackspace Hosting) | |
5 | 2 |
ASN27357 (RACKSPACE - Rackspace Hosting, US)
cp.rackspace.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
rackspace.com
2 redirects
cp.rackspace.com |
37 KB |
4 |
officersguide.ml
1 redirects
officersguide.ml |
27 KB |
5 | 2 |
Domain | Requested by | |
---|---|---|
4 | cp.rackspace.com |
2 redirects
officersguide.ml
|
4 | officersguide.ml |
1 redirects
officersguide.ml
|
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cp.rackspace.com Thawte TLS RSA CA G1 |
2018-06-08 - 2020-07-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://officersguide.ml/rackspaceauto/r/66w1500gslmk3wwqtu9sjop9.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 441F30EE2F12B98044C01A6C365D8FC6
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://officersguide.ml/rackspaceauto/r/
HTTP 302
http://officersguide.ml/rackspaceauto/r/66w1500gslmk3wwqtu9sjop9.php?rand=13InboxLightaspxn.17742564... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://officersguide.ml/rackspaceauto/r/
HTTP 302
http://officersguide.ml/rackspaceauto/r/66w1500gslmk3wwqtu9sjop9.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 2- http://cp.rackspace.com/clients/webmail/beta_apps_rackspace_com/images/logo_20141002.png HTTP 302
- https://cp.rackspace.com/clients/webmail/beta_apps_rackspace_com/images/logo_20141002.png
- http://cp.rackspace.com/clients/webmail/apps_rackspace_com/images/third_rse_plus_banner.png HTTP 302
- https://cp.rackspace.com/clients/webmail/apps_rackspace_com/images/third_rse_plus_banner.png
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
66w1500gslmk3wwqtu9sjop9.php
officersguide.ml/rackspaceauto/r/ Redirect Chain
|
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
officersguide.ml/rackspaceauto/r/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
officersguide.ml/rackspaceauto/r/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_20141002.png
cp.rackspace.com/clients/webmail/beta_apps_rackspace_com/images/ Redirect Chain
|
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
third_rse_plus_banner.png
cp.rackspace.com/clients/webmail/apps_rackspace_com/images/ Redirect Chain
|
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Rackspace (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
officersguide.ml/ | Name: PHPSESSID Value: co9trera4frojdfdlriaat7eo4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cp.rackspace.com
officersguide.ml
2001:4802:7a01:10::7
37.120.146.93
13147a08caf8aea8804773ce56a9ba04259741eef431fda3c0dd601852db10d5
315e4200d833210ced8ee4c4fab0dec79738d0d7f750955f08be73fdc1752784
4438c6ae6be8444c64f66f7a5f17665f8b31ee0b1616a0ece65f3986be48eb69
d9822ab956a1ab47d45826cc46d8c2a9babd345008a2c452de6a710a5b47b747
f167dfd881b45166119fce39b1fa639e925f80e4e7391e3cbe83f843490b7b19