zeckop.org
Open in
urlscan Pro
94.177.246.247
Malicious Activity!
Public Scan
Submission: On June 05 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 2nd 2018. Valid for: 3 months.
This is the only time zeckop.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 94.177.246.247 94.177.246.247 | 200185 (XANDMAIL-ASN) (XANDMAIL-ASN) | |
18 | 104.16.99.29 104.16.99.29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
5 | 104.16.100.29 104.16.100.29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
25 | 3 |
ASN200185 (XANDMAIL-ASN, DE)
PTR: host247-246-177-94.static.arubacloud.de
zeckop.org |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cfl.dropboxstatic.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cfl.dropboxstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
dropboxstatic.com
cfl.dropboxstatic.com |
318 KB |
2 |
zeckop.org
zeckop.org |
81 KB |
25 | 2 |
Domain | Requested by | |
---|---|---|
23 | cfl.dropboxstatic.com |
zeckop.org
|
2 | zeckop.org |
zeckop.org
|
25 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.dropbox.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
zeckop.org cPanel, Inc. Certification Authority |
2018-06-02 - 2018-08-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://zeckop.org/sec/index1.php
Frame ID: B6A71BAB1EF52EFBB59EE4BDA0CEA197
Requests: 25 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
reCAPTCHA (Captchas) Expand
Detected patterns
- html /(?:<div[^>]+id="recaptcha_image|<link[^>]+recaptcha|document\.getElementById\('recaptcha')/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Desktop app
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index1.php
zeckop.org/sec/ |
81 KB 81 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
logo-vflM1D8V1.css
cfl.dropboxstatic.com/static/css/index/obsidian/ |
601 B 377 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_navigation-vflslWsEC.css
cfl.dropboxstatic.com/static/css/index/components/ |
31 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_hero-vflkvw3uD.css
cfl.dropboxstatic.com/static/css/index/components/ |
2 KB 899 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_creation-vflfjBRHX.css
cfl.dropboxstatic.com/static/css/index/components/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_media-vflU5svEh.css
cfl.dropboxstatic.com/static/css/index/components/ |
3 KB 835 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebrand_page-vfljGUoI3.css
cfl.dropboxstatic.com/static/css/index/ |
92 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
index.web-vflqsLerW.css
cfl.dropboxstatic.com/static/css/spectrum/ |
54 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
recaptcha_v2_challenge-vflYEW-GO.css
cfl.dropboxstatic.com/static/css/ |
945 B 380 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
login_or_register-vfl9esD0O.css
cfl.dropboxstatic.com/static/css/ |
3 KB 1021 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
login_form-vfl3Iq3n-.css
cfl.dropboxstatic.com/static/css/components/ |
18 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
homepage_login_register_panel-vfl4EHfbJ.css
cfl.dropboxstatic.com/static/css/rebrand/elements/ |
30 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
glyph_aqua.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/glyphs/ |
676 B 491 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
wordmark_white.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/wordmarks/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
dropbox_digital_desktop_02-vflq-5NiU.jpg
cfl.dropboxstatic.com/static/images/index/rebrand/co_create/desktop/ |
29 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
glyph_yellow.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/glyphs/ |
676 B 455 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
glyph_blue.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/glyphs/ |
676 B 505 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
wordmark_black.svg
cfl.dropboxstatic.com/static/images/index/rebrand/logos/wordmarks/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
AtlasGrotesk-Regular-Web-vflg7ta4-.woff
cfl.dropboxstatic.com/static/fonts/atlasgrotesk/ |
57 KB 57 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ob-arrow-aqua-vflrYQuro.svg
zeckop.org/static/images/index/rebrand/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
SharpGroteskDBBook20-vflytuLBR.woff2
cfl.dropboxstatic.com/static/fonts/sharpgrotesk/ |
43 KB 43 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
SharpGroteskDBMedium22-vflPPMtcG.woff2
cfl.dropboxstatic.com/static/fonts/sharpgrotesk/ |
48 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
SharpGroteskDBMedium20-vfloPliP8.woff2
cfl.dropboxstatic.com/static/fonts/sharpgrotesk/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
AtlasGrotesk-Light-Web-vfl5CyyQq.woff
cfl.dropboxstatic.com/static/fonts/atlasgrotesk/ |
60 KB 60 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
checkmark-vfl56VRyi.svg
cfl.dropboxstatic.com/static/images/ |
1 KB 731 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cfl.dropboxstatic.com
zeckop.org
104.16.100.29
104.16.99.29
94.177.246.247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