rokksafn.is
Open in
urlscan Pro
185.174.176.13
Malicious Activity!
Public Scan
Effective URL: https://rokksafn.is/.authenticat/secure.php?id=87836714
Submission: On August 06 via manual from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 30th 2018. Valid for: 3 months.
This is the only time rokksafn.is was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 192.185.162.211 192.185.162.211 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
1 1 | 99.198.101.186 99.198.101.186 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC - SingleHop LLC) | |
1 7 | 185.174.176.13 185.174.176.13 | 206842 (TACTICA) (TACTICA) | |
6 | 1 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: 192-185-162-211.unifiedlayer.com
beardown.ca |
ASN32475 (SINGLEHOP-LLC - SingleHop LLC, US)
PTR: neo.superdnssite.com
aidma.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
rokksafn.is
1 redirects
rokksafn.is |
49 KB |
1 |
aidma.in
1 redirects
aidma.in |
335 B |
1 |
beardown.ca
1 redirects
beardown.ca |
195 B |
6 | 3 |
Domain | Requested by | |
---|---|---|
7 | rokksafn.is |
1 redirects
rokksafn.is
|
1 | aidma.in | 1 redirects |
1 | beardown.ca | 1 redirects |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
rokksafn.is cPanel, Inc. Certification Authority |
2018-06-30 - 2018-09-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rokksafn.is/.authenticat/secure.php?id=87836714
Frame ID: E950737760BD334F41B5F23D83A5D00F
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://beardown.ca/ts/dxng
HTTP 301
https://aidma.in/q.php HTTP 302
https://rokksafn.is/.authenticat HTTP 301
https://rokksafn.is/.authenticat/ Page URL
- https://rokksafn.is/.authenticat/secure.php?id=87836714 Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://beardown.ca/ts/dxng
HTTP 301
https://aidma.in/q.php HTTP 302
https://rokksafn.is/.authenticat HTTP 301
https://rokksafn.is/.authenticat/ Page URL
- https://rokksafn.is/.authenticat/secure.php?id=87836714 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://beardown.ca/ts/dxng HTTP 301
- https://aidma.in/q.php HTTP 302
- https://rokksafn.is/.authenticat HTTP 301
- https://rokksafn.is/.authenticat/
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
rokksafn.is/.authenticat/ Redirect Chain
|
218 B 390 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
secure.php
rokksafn.is/.authenticat/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
rokksafn.is/.authenticat/lib/css/ |
23 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.1.11.1.min.js
rokksafn.is/.authenticat/lib/js/ |
94 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
rokksafn.is/.authenticat/lib/js/ |
817 B 410 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
rokksafn.is/.authenticat/lib/css/img/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rokksafn.is/ | Name: PHPSESSID Value: gak3ucmub7t2n67uuoa9techd7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aidma.in
beardown.ca
rokksafn.is
185.174.176.13
192.185.162.211
99.198.101.186
2f811701e3f8550d2742a2088bb3b14e8ffcabfd4896668086367e46dba758f3
540bc6dec1dd4b92ea4d3fb903f69eabf6d919afd48f4e312b163c28cff0f441
5bf642c354f22ce4b30054d88f626ba06bd748e306a8fb36f5a3f143923fbf45
91555248b245023c08f525948e72f388c4d17f29cc34a34d2fca28e36835c9a9
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
ce840503a2c5167ccd9652602de6edd62158d068fd39aaa7e2bad5704c38ddd3