portcharlottebottox.com
Open in
urlscan Pro
162.241.65.79
Malicious Activity!
Public Scan
Effective URL: http://portcharlottebottox.com/aksel/aksel%20pdf/doc/index.php?src=DluZDluZHNmNDBlb2RzaDluZHNmNDDBlb2RzaTRpZWprMzBka2prZWtjamtk...
Submission: On March 27 via api from CA
Summary
This is the only time portcharlottebottox.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Excel / PDF download (Online) Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 162.241.65.79 162.241.65.79 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
10 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-65-79.unifiedlayer.com
portcharlottebottox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
portcharlottebottox.com
1 redirects
portcharlottebottox.com |
200 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
11 | portcharlottebottox.com |
1 redirects
portcharlottebottox.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://portcharlottebottox.com/aksel/aksel%20pdf/doc/index.php?src=DluZDluZHNmNDBlb2RzaDluZHNmNDDBlb2RzaTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbHNmNDBlb2RzaTRDluZHNmNDBlb2RzaTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbZWppZXdpb2U5NDluZHNmNDBlb2RzaTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpb25ja29uc2NrIGtjIGtqIHZqayBj
Frame ID: 6ADB5C0B028873986AB4D42C3997D5F6
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://portcharlottebottox.com/aksel/aksel%20pdf/
HTTP 302
http://portcharlottebottox.com/aksel/aksel%20pdf/doc/index.php?src=DluZDluZHNmNDBlb2RzaDluZHNmNDDBlb2RzaTRp... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://portcharlottebottox.com/aksel/aksel%20pdf/
HTTP 302
http://portcharlottebottox.com/aksel/aksel%20pdf/doc/index.php?src=DluZDluZHNmNDBlb2RzaDluZHNmNDDBlb2RzaTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbHNmNDBlb2RzaTRDluZHNmNDBlb2RzaTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbpZWprMzBka2prZWtjamtkIGNuZmk0bmZpbZWppZXdpb2U5NDluZHNmNDBlb2RzaTRpZWprMzBka2prZWtjamtkIGNuZmk0bmZpb25ja29uc2NrIGtjIGtqIHZqayBj Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
index.php
portcharlottebottox.com/aksel/aksel%20pdf/doc/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.css
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.js
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
89 KB 90 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.js
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
javascript1.js
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
4 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ph.png
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adobe_logo_new_1.jpg
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
portcharlottebottox.com/aksel/aksel%20pdf/doc/index_files/ |
54 KB 54 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Excel / PDF download (Online) Adobe (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| jQuery16202666081553013808 function| script function| click_to_download function| make_the_delay function| redirect_the function| now_download function| wow_download function| MM_reloadPage object| input1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
portcharlottebottox.com/ | Name: PHPSESSID Value: e6755f41081f0a076b0e1b64ecc43d54 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
portcharlottebottox.com
162.241.65.79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