alllogin.net
Open in
urlscan Pro
2606:4700:3034::681c:157e
Malicious Activity!
Public Scan
Submission: On April 29 via manual from GB
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on February 4th 2020. Valid for: 8 months.
This is the only time alllogin.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 2606:4700:303... 2606:4700:3034::681c:157e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:85e5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
alllogin.net
alllogin.net |
770 KB |
1 |
cloudflare.com
ajax.cloudflare.com |
4 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | alllogin.net |
alllogin.net
ajax.cloudflare.com |
1 | ajax.cloudflare.com |
alllogin.net
|
15 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-02-04 - 2020-10-09 |
8 months | crt.sh |
cloudflare.com CloudFlare Inc ECC CA-2 |
2020-01-07 - 2020-10-09 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://alllogin.net/docummentee/login.php
Frame ID: DFFF6BB55DCE0D30DA7B06EA9AB5EBF2
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
alllogin.net/docummentee/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
alllogin.net/docummentee/We_files/ |
24 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
grwwk.css
alllogin.net/docummentee/We_files/ |
191 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
alllogin.net/docummentee/We_files/ |
63 KB 63 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rocket-loader.min.js
ajax.cloudflare.com/cdn-cgi/scripts/7089c43e/cloudflare-static/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sb-admin-2.js
alllogin.net/docummentee/We_files/ |
1 KB 696 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery_002.html
alllogin.net/docummentee/We_files/ |
332 B 312 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.html
alllogin.net/docummentee/We_files/ |
334 B 317 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.html
alllogin.net/docummentee/We_files/ |
318 B 335 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.js
alllogin.net/docummentee/We_files/ |
37 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery_002.js
alllogin.net/docummentee/We_files/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
alllogin.net/docummentee/We_files/ |
94 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
alllogin.net/docummentee/We_files/ |
496 KB 497 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow.png
alllogin.net/docummentee/We_files/ |
58 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tent.png
alllogin.net/docummentee/We_files/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| __cfQR function| $ function| jQuery boolean| __cfRLUnblockHandlers1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.alllogin.net/ | Name: __cfduid Value: dcaaf0661ce3ff2e74cc9393a3220ee7f1588149240 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.cloudflare.com
alllogin.net
2606:4700:3034::681c:157e
2606:4700::6810:85e5
0d8966493054effd76ac60b528fd1bf0b1dd7fcac5b0a8fe93825101559c37f6
2d3ffe8452cb4bbaa2acafacb0b2a675f0494d6398e124d775017ea85c3a6570
2e15e743175e8458176e23a57e9bca6ead66c3d2ea800ac7d951ef057aadf7c2
33158c6da5969dc254037dd573a8a290cb12197b03d03a7c9446f6cea18f783c
468a524ffbc16d26f9237ef8b7bab0e8d92370f22f12630e2795c54b1297944b
9e7a0d44a43b5c0094616b8eba6d46c7f34f38ee7c6aea26881652a78eec08d4
a1513eadbc136b4801f6c18da3829bc84c1bb29e8b98e5e38c753f785d3e2da4
a78e6da70c2e12395c6b9b023f86bbe89f8e78903e7c59d5489aec14be97a033
ace77fd30206ec8338ee91a103f7f77adca8b2bdef251b1f350ce27d53d7bfcc
b08cdbc2d30e656a86b20f8342428d5863f70f4b30135b4f4061f754ce932f5e
c6e899c1f7e67fabe9b7928cce0522137d088c353d4beaf845f846615be38ccb
c9c49fbaabcc3b229fae9e0995084601f98f9626fa2d024391dbf244f4c19971
cf987b95981491fef972d6027cc91a0e5dda87647619e3a01e8e2a42d5ce1a90
f1a9c17b50d6278a694406d9e5dce160f81afd7a2683dfdf07f0651c38bdaa8e
f83a0f50000325deac64a58ebdb77aca091de863ac26b4c563bc28b8e8195f7f