www.regalcommunication.net
Open in
urlscan Pro
103.169.160.74
Malicious Activity!
Public Scan
Submission: On March 08 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 4th 2024. Valid for: 3 months.
This is the only time www.regalcommunication.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 103.169.160.74 103.169.160.74 | 148993 (DIANAHOST...) (DIANAHOSTLTD-AS-AP Diana Host Ltd) | |
1 2 | 2606:4700:303... 2606:4700:3032::ac43:a726 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3037::ac43:d48f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 51.77.64.70 51.77.64.70 | 16276 (OVH) (OVH) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | () () | |
19 | 9 |
ASN148993 (DIANAHOSTLTD-AS-AP Diana Host Ltd, BD)
PTR: server9.serverdiana.com
www.regalcommunication.net |
ASN13335 (CLOUDFLARENET, US)
x6nc5z54q5c.flgalgtop.online |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
jgakgalga.online
rpmk8ihjy5.jgakgalga.online |
413 KB |
2 |
amios.shop
1 redirects
amios.shop |
10 KB |
1 |
msftauth.net
aadcdn.msftauth.net |
753 B |
1 |
ip-api.com
pro.ip-api.com — Cisco Umbrella Rank: 5774 |
427 B |
1 |
flgalgtop.online
x6nc5z54q5c.flgalgtop.online |
193 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 228 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
78 KB |
1 |
regalcommunication.net
www.regalcommunication.net |
1 KB |
19 | 8 |
Domain | Requested by | |
---|---|---|
2 | rpmk8ihjy5.jgakgalga.online |
code.jquery.com
|
2 | amios.shop |
1 redirects
www.regalcommunication.net
|
1 | aadcdn.msftauth.net | |
1 | pro.ip-api.com |
code.jquery.com
|
1 | x6nc5z54q5c.flgalgtop.online | |
1 | cdnjs.cloudflare.com |
www.regalcommunication.net
|
1 | code.jquery.com |
www.regalcommunication.net
|
1 | www.regalcommunication.net | |
19 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.regalcommunication.net R3 |
2024-02-04 - 2024-05-04 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
jgakgalga.online GTS CA 1P5 |
2024-02-18 - 2024-05-18 |
3 months | crt.sh |
flgalgtop.online GTS CA 1P5 |
2024-02-19 - 2024-05-19 |
3 months | crt.sh |
*.ip-api.com Sectigo RSA Domain Validation Secure Server CA |
2023-12-21 - 2025-01-20 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.regalcommunication.net/information/title/pro.htm
Frame ID: DF6967C5F950418FE3CD7EE203F2474E
Requests: 20 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://amios.shop/rrb?i=67216239 HTTP 301
- https://amios.shop/rrb/?i=67216239
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pro.htm
www.regalcommunication.net/information/title/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
amios.shop/rrb/ Redirect Chain
|
20 KB 9 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
rpmk8ihjy5.jgakgalga.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
x6nc5z54q5c.flgalgtop.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
pro.ip-api.com/json/ |
271 B 427 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
/
rpmk8ihjy5.jgakgalga.online/obufsssssssscaaatoion/ |
2 MB 219 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
69 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 753 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
rpmk8ihjy5.jgakgalga.online/static/media/microsoft_logo.png/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
key_workshcool.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
person_workshcool.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
person_office.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
message_think.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
auth_number.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
call_2fa.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2fa_authenticator.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
godaddy-left.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg_normal.png
rpmk8ihjy5.jgakgalga.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/microsoft_logo.png/
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/key_workshcool.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/person_workshcool.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/person_office.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/message_think.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/auth_number.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/call_2fa.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/2fa_authenticator.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/godaddy-left.png
- Domain
- rpmk8ihjy5.jgakgalga.online
- URL
- https://rpmk8ihjy5.jgakgalga.online/static/media/bg_normal.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)39 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Dliog object| script function| _0x31c8 function| _0x2dd6 string| chain string| code function| _0x486063 function| _0x3c6ac8 function| _0x3713e3 function| _0x2d0480 function| _0x3b668a function| _0x5d5152 function| _0x4256ba function| _0xa86b94 function| _0x791f33 function| _0x53f5e7 function| _0x5ed599 function| _0x35ba1c function| _0x555091 function| _0x50a77a function| _0xdf1035 function| _0x594f6e function| _0x30f641 function| _0x9bd84f object| div1 function| _0x3e98 string| Page_type string| IGOBZL string| cbbg function| _0x40fb string| CIdLSdeu string| kaka90nal string| ka45k459final2 string| kak0011afinal string| getjsonnn number| countttingerr object| CryptoJS function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
amios.shop
cdnjs.cloudflare.com
code.jquery.com
pro.ip-api.com
rpmk8ihjy5.jgakgalga.online
www.regalcommunication.net
x6nc5z54q5c.flgalgtop.online
rpmk8ihjy5.jgakgalga.online
103.169.160.74
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2606:4700:3032::ac43:a726
2606:4700:3037::ac43:d48f
2606:4700::6811:180e
2a04:4e42:400::649
2a06:98c1:3120::3
51.77.64.70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