tastic.top
Open in
urlscan Pro
173.254.213.14
Malicious Activity!
Public Scan
Effective URL: http://tastic.top/login.php?cmd=login_submit&id=12531e88dba505b8ed6aeef5e4a35aa612531e88dba505b8ed6aeef5e4a35aa6&s...
Submission: On April 11 via api from GB
Summary
This is the only time tastic.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 23 | 173.254.213.14 173.254.213.14 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC) | |
3 | 2606:4700::68... 2606:4700::6813:c497 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
2 | 2a00:1450:400... 2a00:1450:4001:80b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
18 | 5 |
ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US)
PTR: 173.254.213.14.static.quadranet.com
tastic.top |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
tastic.top
12 redirects
tastic.top |
258 KB |
3 |
cloudflare.com
cdnjs.cloudflare.com |
73 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
1 |
gstatic.com
fonts.gstatic.com |
9 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
18 | 5 |
Domain | Requested by | |
---|---|---|
23 | tastic.top |
12 redirects
tastic.top
|
3 | cdnjs.cloudflare.com |
tastic.top
|
2 | fonts.googleapis.com |
tastic.top
|
1 | fonts.gstatic.com |
tastic.top
|
1 | code.jquery.com |
tastic.top
|
18 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-02 - 2019-09-08 |
6 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
*.google.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://tastic.top/login.php?cmd=login_submit&id=12531e88dba505b8ed6aeef5e4a35aa612531e88dba505b8ed6aeef5e4a35aa6&session=12531e88dba505b8ed6aeef5e4a35aa612531e88dba505b8ed6aeef5e4a35aa6
Frame ID: 2B7072DF039506A003528BD458EEB537
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://tastic.top/
HTTP 302
http://tastic.top/login.php?cmd=login_submit&id=12531e88dba505b8ed6aeef5e4a35aa612531e88dba505... Page URL
Detected technologies
Materialize CSS (Web Frameworks) ExpandDetected patterns
- html /<link[^>]* href="[^"]*materialize(?:\.min)?\.css/i
- script /materialize(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Hammer.js (JavaScript Libraries) Expand
Detected patterns
- env /^Hammer$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
- html /<link[^>]* href="[^"]*materialize(?:\.min)?\.css/i
- script /materialize(?:\.min)?\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://tastic.top/
HTTP 302
http://tastic.top/login.php?cmd=login_submit&id=12531e88dba505b8ed6aeef5e4a35aa612531e88dba505b8ed6aeef5e4a35aa6&session=12531e88dba505b8ed6aeef5e4a35aa612531e88dba505b8ed6aeef5e4a35aa6 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 14- http://tastic.top/font/atlasbold.ttf HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=fe04d359fac0f32fa9ccd60cc1268ec1fe04d359fac0f32fa9ccd60cc1268ec1&session=fe04d359fac0f32fa9ccd60cc1268ec1fe04d359fac0f32fa9ccd60cc1268ec1 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=42ed5c5c9d4a95b3069fec9c8ad3300642ed5c5c9d4a95b3069fec9c8ad33006&session=42ed5c5c9d4a95b3069fec9c8ad3300642ed5c5c9d4a95b3069fec9c8ad33006 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=e3dd829c90e69a960e2ce70606991ce9e3dd829c90e69a960e2ce70606991ce9&session=e3dd829c90e69a960e2ce70606991ce9e3dd829c90e69a960e2ce70606991ce9 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=c301162016dff334716f42ebe41e9136c301162016dff334716f42ebe41e9136&session=c301162016dff334716f42ebe41e9136c301162016dff334716f42ebe41e9136
- http://tastic.top/font/atlas.otf HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=d169457ad9e3f64552cda50cd3ea8ed4d169457ad9e3f64552cda50cd3ea8ed4&session=d169457ad9e3f64552cda50cd3ea8ed4d169457ad9e3f64552cda50cd3ea8ed4 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=b8155b178103e8c8514390fff7910718b8155b178103e8c8514390fff7910718&session=b8155b178103e8c8514390fff7910718b8155b178103e8c8514390fff7910718 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=990bcc805f46017b7dcf201d2b493ea3990bcc805f46017b7dcf201d2b493ea3&session=990bcc805f46017b7dcf201d2b493ea3990bcc805f46017b7dcf201d2b493ea3 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=8a1c575a4da3c879a9de0614732cb3588a1c575a4da3c879a9de0614732cb358&session=8a1c575a4da3c879a9de0614732cb3588a1c575a4da3c879a9de0614732cb358 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=6a6599d00155c7989accae22bab06c546a6599d00155c7989accae22bab06c54&session=6a6599d00155c7989accae22bab06c546a6599d00155c7989accae22bab06c54 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=9c2e8b6ac95323cdc6c8ed83e39654609c2e8b6ac95323cdc6c8ed83e3965460&session=9c2e8b6ac95323cdc6c8ed83e39654609c2e8b6ac95323cdc6c8ed83e3965460 HTTP 302
- http://tastic.top/font/login.php?cmd=login_submit&id=a84452d7326b9ad9c97a2844d36b6d58a84452d7326b9ad9c97a2844d36b6d58&session=a84452d7326b9ad9c97a2844d36b6d58a84452d7326b9ad9c97a2844d36b6d58
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
tastic.top/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
materialize.min.css
cdnjs.cloudflare.com/ajax/libs/materialize/0.99.0/css/ |
128 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
tastic.top/css/ |
4 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
materialize.min.js
cdnjs.cloudflare.com/ajax/libs/materialize/0.99.0/js/ |
157 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon
fonts.googleapis.com/ |
574 B 419 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
5 KB 640 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
tastic.top/img/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hero.png
tastic.top/img/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yahoo.png
tastic.top/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aol.png
tastic.top/img/ |
776 B 1018 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
outlook.png
tastic.top/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
365.png
tastic.top/img/ |
947 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
others.png
tastic.top/img/ |
806 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.php
tastic.top/font/ Redirect Chain
|
100 KB 100 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.php
tastic.top/font/ Redirect Chain
|
100 KB 100 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v16/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| getTime function| Vel function| Hammer object| Materialize object| Waves function| Picker function| validate_field0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
tastic.top
173.254.213.14
205.185.208.52
2606:4700::6813:c497
2a00:1450:4001:808::2003
2a00:1450:4001:80b::200a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