f0285779.xsph.ru
Open in
urlscan Pro
2a0a:2b43:45:3e73::
Malicious Activity!
Public Scan
Effective URL: http://f0285779.xsph.ru/royalmail367342342032/login.php?id=54702346
Submission: On April 12 via manual from US
Summary
This is the only time f0285779.xsph.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Royal Mail (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 184.73.106.85 184.73.106.85 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 1 | 34.194.129.170 34.194.129.170 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
14 | 2a0a:2b43:45:... 2a0a:2b43:45:3e73:: | 35278 (SPRINTHOST) (SPRINTHOST) | |
2 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2 - Highwinds Network Group) | |
16 | 2 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-184-73-106-85.compute-1.amazonaws.com
rebrand.ly |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-34-194-129-170.compute-1.amazonaws.com
rebrand.ly |
ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US)
use.fontawesome.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
xsph.ru
f0285779.xsph.ru |
123 KB |
2 |
fontawesome.com
use.fontawesome.com |
70 KB |
2 |
rebrand.ly
2 redirects
rebrand.ly |
500 B |
16 | 3 |
Domain | Requested by | |
---|---|---|
14 | f0285779.xsph.ru |
f0285779.xsph.ru
|
2 | use.fontawesome.com |
f0285779.xsph.ru
|
2 | rebrand.ly | 2 redirects |
16 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.fontawesome.com DigiCert SHA2 Secure Server CA |
2018-09-17 - 2019-11-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://f0285779.xsph.ru/royalmail367342342032/login.php?id=54702346
Frame ID: C6B93AAEC5F9A4F367334762560C4EEF
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://rebrand.ly/7afef
HTTP 301
https://rebrand.ly/809a0 HTTP 301
http://f0285779.xsph.ru/royalmail367342342032/ Page URL
- http://f0285779.xsph.ru/royalmail367342342032/login.php?id=54702346 Page URL
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://rebrand.ly/7afef
HTTP 301
https://rebrand.ly/809a0 HTTP 301
http://f0285779.xsph.ru/royalmail367342342032/ Page URL
- http://f0285779.xsph.ru/royalmail367342342032/login.php?id=54702346 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://rebrand.ly/7afef HTTP 301
- https://rebrand.ly/809a0 HTTP 301
- http://f0285779.xsph.ru/royalmail367342342032/
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
f0285779.xsph.ru/royalmail367342342032/ Redirect Chain
|
217 B 586 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
f0285779.xsph.ru/royalmail367342342032/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-latest.min.js
f0285779.xsph.ru/royalmail367342342032/lib/js/ |
94 KB 36 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.min.js
f0285779.xsph.ru/royalmail367342342032/lib/js/ |
8 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Acc_Carding.js
f0285779.xsph.ru/royalmail367342342032/lib/js/ |
1 KB 772 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chronopost.css
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.css
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
485 B 790 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
stylee.css
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css_1.css
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
0 301 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
30 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.1.0/css/ |
45 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chronopost_logo.png
f0285779.xsph.ru/royalmail367342342032/lib/img/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Acc_mask.js
f0285779.xsph.ru/royalmail367342342032/lib/js/ |
129 B 449 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PlutoSansDPDRegular-Web.woff
f0285779.xsph.ru/royalmail367342342032/lib/css/ |
59 KB 59 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
use.fontawesome.com/releases/v5.1.0/webfonts/ |
58 KB 59 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Royal Mail (Government)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery object| $jscomp function| myFunction1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
f0285779.xsph.ru/ | Name: PHPSESSID Value: gu99vl9e126ifi7cjq621ch727 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
f0285779.xsph.ru
rebrand.ly
use.fontawesome.com
184.73.106.85
23.111.9.35
2a0a:2b43:45:3e73::
34.194.129.170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