robinhood-payments.com
Open in
urlscan Pro
80.94.92.29
Malicious Activity!
Public Scan
Submission: On July 09 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on July 8th 2023. Valid for: 3 months.
This is the only time robinhood-payments.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Robinhood (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 80.94.92.29 80.94.92.29 | 47890 (UNMANAGED...) (UNMANAGED-DEDICATED-SERVERS) | |
6 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
robinhood-payments.com
robinhood-payments.com |
959 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | robinhood-payments.com |
robinhood-payments.com
|
6 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
robinhood.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
robinhood-payments.com R3 |
2023-07-08 - 2023-10-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://robinhood-payments.com/
Frame ID: 9B8489D0D9D8C061F018394013C45B09
Requests: 10 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: Forgot your password?
Search URL Search Domain Scan URL
Title: Forgot your email address?
Search URL Search Domain Scan URL
Title: Create an account
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
robinhood-payments.com/ |
2 MB 927 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rl-style.css
robinhood-payments.com/rl-style/ |
215 B 542 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
378 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
socket.io.js
robinhood-payments.com/socket.io-client-4.6.0/dist/ |
122 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rl-script.js
robinhood-payments.com/rl-script/ |
11 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spinner.css
robinhood-payments.com/rl-style/ |
868 B 765 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
config.js
robinhood-payments.com/rl-script/ |
297 B 639 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Robinhood (Financial)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| savepage_ShadowLoader function| io0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
robinhood-payments.com
80.94.92.29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