roxxanrendon.com
Open in
urlscan Pro
162.241.125.173
Malicious Activity!
Public Scan
Submission: On September 04 via api from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on September 2nd 2020. Valid for: 3 months.
This is the only time roxxanrendon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fidelity (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 162.241.125.173 162.241.125.173 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
8 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-125-173.unifiedlayer.com
roxxanrendon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
roxxanrendon.com
roxxanrendon.com |
597 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | roxxanrendon.com |
roxxanrendon.com
|
8 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.fidelity.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
roxxanrendon.com cPanel, Inc. Certification Authority |
2020-09-02 - 2020-12-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://roxxanrendon.com/Fidelity/qqr.php
Frame ID: 7FA6ECA25031B0CAEF84469A09B0BC63
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cancel
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
qqr.php
roxxanrendon.com/Fidelity/ |
196 KB 197 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
roxxanrendon.com/Fidelity/css/ |
127 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-theme.css
roxxanrendon.com/Fidelity/css/ |
14 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
capability-base.css
roxxanrendon.com/Fidelity/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fidelity-sans.css
roxxanrendon.com/Fidelity/css/ |
368 KB 369 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rtlcust-base.css
roxxanrendon.com/Fidelity/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
identifyuser.css
roxxanrendon.com/Fidelity/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
roxxanrendon.com/Fidelity/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fidelity (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
roxxanrendon.com/ | Name: PHPSESSID Value: b2fa6765dc3ad0f8e2f941f089f81079 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
roxxanrendon.com
162.241.125.173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