www.razitkar.cz
Open in
urlscan Pro
2a02:2b88:1:4::71
Malicious Activity!
Public Scan
Submission Tags: 6250453
Submission: On October 23 via api from JP
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 30th 2019. Valid for: 3 months.
This is the only time www.razitkar.cz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Cogeco (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 2a02:2b88:1:4... 2a02:2b88:1:4::71 | 197019 (WEDOS) (WEDOS) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
razitkar.cz
www.razitkar.cz |
443 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | www.razitkar.cz |
www.razitkar.cz
|
13 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
myaccount.cogeco.ca |
moncompte.cogeco.ca |
www.cogeco.ca |
smarticon.geotrust.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
razitkar.cz Let's Encrypt Authority X3 |
2019-09-30 - 2019-12-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.razitkar.cz/image/cache/data/login/index.php
Frame ID: F6CCF06D61A14B0F8D5263EFCB69EF4A
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Google Tag Manager (Tag Managers) Expand
Detected patterns
- html /<!-- (?:End )?Google Tag Manager -->/i
Page Statistics
8 Outgoing links
These are links going to different origins than the main page.
Title: English
Search URL Search Domain Scan URL
Title: Nom d’utilisateur oublié?
Search URL Search Domain Scan URL
Title: Mot de passe oublié?
Search URL Search Domain Scan URL
Title: Créez un profil Mon Compte
Search URL Search Domain Scan URL
Title: Connexion au Courriel Web
Search URL Search Domain Scan URL
Title: Aller à Cogeco.ca
Search URL Search Domain Scan URL
Title: Découvrez tous les bénéfices de Mon Compte
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
www.razitkar.cz/image/cache/data/login/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myaccount.css
www.razitkar.cz/image/cache/data/login/resource_pack/css/20190828-106/ |
334 KB 59 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
header.js
www.razitkar.cz/image/cache/data/login/resource_pack/js/20190828-106/ |
0 126 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-cogeco.png
www.razitkar.cz/image/cache/data/login/resources/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
firefly_makeover_desktop_fr.png
www.razitkar.cz/image/cache/data/login/resources/images/banners/ |
72 KB 72 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
firefly_makeover_mobile_fr.png
www.razitkar.cz/image/cache/data/login/resources/images/banners/ |
111 KB 112 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
www.razitkar.cz/image/cache/data/login/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer.js
www.razitkar.cz/image/cache/data/login/resource_pack/js/20190828-106/ |
433 KB 120 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sidemenu-bg.png
www.razitkar.cz/image/cache/data/login/resources/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myriadpro-regular-webfont.woff
www.razitkar.cz/image/cache/data/login/resource_pack/css/20190828-106/ |
27 KB 28 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff
www.razitkar.cz/image/cache/data/login/resource_pack/css/20190828-106/ |
34 KB 34 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
processing.gif
www.razitkar.cz/image/cache/data/login/resources/images/ |
8 KB 8 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
processing.gif
www.razitkar.cz/acpub/resources/images/ |
235 B 235 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Cogeco (Telecommunication)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| dataLayer function| showLoadingWheel function| hideLoadingWheel function| moveSortIconOnCollapse function| handleDomainDropdown object| Cogeco function| initAccessibilityTools function| showMobileMenu function| initBandwidthUnitSelectors function| getPageLang function| handleCharts function| fixAutoComplete function| initRatingFormField function| $ function| jQuery object| jQuery111109928448684065974 boolean| IE object| Wilq320 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.razitkar.cz
2a02:2b88:1:4::71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