server-stone.com
Open in
urlscan Pro
2606:4700:3033::ac43:9d98
Malicious Activity!
Public Scan
Submission: On March 14 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on March 9th 2024. Valid for: 3 months.
This is the only time server-stone.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 2606:4700:303... 2606:4700:3033::ac43:9d98 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
server-stone.com
server-stone.com |
869 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 228 |
32 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
6 | server-stone.com |
server-stone.com
|
2 | cdnjs.cloudflare.com |
server-stone.com
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
server-stone.com GTS CA 1P5 |
2024-03-09 - 2024-06-07 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://server-stone.com/login/present.php?Chase_id=&country=United%20States&iso=US
Frame ID: 5ADBF169412579E6DA86B0C798C1D8A3
Requests: 1 HTTP requests in this frame
Frame:
https://server-stone.com/login/login.php
Frame ID: 8CF1D77C5807713A47133EF36685B718
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Secure UpdateDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Modernizr (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
present.php
server-stone.com/login/ |
569 B 762 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.php
server-stone.com/login/ Frame 8CF1 |
8 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1.php
server-stone.com/login/assets/css/ Frame 8CF1 |
25 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/ Frame 8CF1 |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ Frame 8CF1 |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
white_logo.svg
server-stone.com/login/assets/images/ Frame 8CF1 |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1024_bg.jpg
server-stone.com/login/assets/images/ Frame 8CF1 |
806 KB 807 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
lighter_font.woff
server-stone.com/login/assets/fonts/ Frame 8CF1 |
53 KB 54 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
server-stone.com/ | Name: PHPSESSID Value: 3pr4rbs4cqntf7h49t8ji03s65 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
server-stone.com
2606:4700:3033::ac43:9d98
2606:4700::6811:190e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