allures.ru
Open in
urlscan Pro
2a03:6f00:1::5c35:7d4d
Malicious Activity!
Public Scan
Submission: On May 29 via automatic, source openphish
Summary
This is the only time allures.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
19 | 2a03:6f00:1::... 2a03:6f00:1::5c35:7d4d | 9123 (TIMEWEB-AS) (TIMEWEB-AS) | |
19 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
allures.ru
allures.ru |
199 KB |
19 | 1 |
Domain | Requested by | |
---|---|---|
19 | allures.ru |
allures.ru
|
19 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://allures.ru/img/dropbox/
Frame ID: 25936.1
Requests: 19 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
allures.ru/img/dropbox/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
allures.ru/img/dropbox/css/ |
2 KB 721 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styleTinybox.css
allures.ru/img/dropbox/css/ |
2 KB 722 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
allures.ru/img/dropbox/js/ |
60 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popup.js
allures.ru/img/dropbox/js/ |
4 KB 761 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.js
allures.ru/img/dropbox/js/ |
44 KB 21 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
allures.ru/img/dropbox/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-vflvTYLtt.png
allures.ru/img/dropbox/images/ |
44 KB 44 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gmail.jpg
allures.ru/img/dropbox/images/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yahoo.jpg
allures.ru/img/dropbox/images/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hotmail.jpg
allures.ru/img/dropbox/images/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aol.jpg
allures.ru/img/dropbox/images/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
other.jpg
allures.ru/img/dropbox/images/ |
12 KB 12 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tinybox.js
allures.ru/img/dropbox/js/ |
5 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.css
allures.ru/img/dropbox/css/ |
22 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cancel.png
allures.ru/img/dropbox/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lockbg.png
allures.ru/img/dropbox/images/ |
69 KB 69 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_submit.png
allures.ru/img/dropbox/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
allures.ru/img/dropbox/ |
6 KB 6 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Dropbox (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
allures.ru
2a03:6f00:1::5c35:7d4d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