a0454588.xsph.ru
Open in
urlscan Pro
2a0a:2b43:a:5065::
Malicious Activity!
Public Scan
Submission Tags: 6674580
Submission: On July 13 via api from US
Summary
This is the only time a0454588.xsph.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Aruba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 2a0a:2b43:a:5... 2a0a:2b43:a:5065:: | 35278 (SPRINTHOST) (SPRINTHOST) | |
3 | 2a00:1450:400... 2a00:1450:4001:815::2003 | 15169 (GOOGLE) (GOOGLE) | |
16 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
xsph.ru
a0454588.xsph.ru |
89 KB |
3 |
gstatic.com
fonts.gstatic.com |
68 KB |
16 | 2 |
Domain | Requested by | |
---|---|---|
13 | a0454588.xsph.ru |
a0454588.xsph.ru
|
3 | fonts.gstatic.com |
a0454588.xsph.ru
|
16 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.gstatic.com GTS CA 1O1 |
2020-06-17 - 2020-09-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://a0454588.xsph.ru/ID9839D7NA736/loading.php
Frame ID: BA65141B56B2D37302B42843E376F93E
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Lua (Programming Languages) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
loading.php
a0454588.xsph.ru/ID9839D7NA736/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
2 KB 781 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css_002.css
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
191 KB 42 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LoadArt.gif
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
39 KB 40 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-group.png
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0_003.txt
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
299 B 299 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0_002.txt
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
299 B 299 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.txt
a0454588.xsph.ru/ID9839D7NA736/ndart/ |
295 B 295 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
separator.png
a0454588.xsph.ru/Content/Images/ |
298 B 298 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-aruba-standard.png
a0454588.xsph.ru/Content/Images/ |
308 B 308 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
maincontent-bg.png
a0454588.xsph.ru/Content/images/ |
303 B 303 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v14/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff
a0454588.xsph.ru/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v14/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh7USSwiPGQ.woff2
fonts.gstatic.com/s/lato/v14/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.ttf
a0454588.xsph.ru/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Aruba (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
a0454588.xsph.ru/ | Name: PHPSESSID Value: 34886105eb5f438dde18caf5b7ae6206 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a0454588.xsph.ru
fonts.gstatic.com
2a00:1450:4001:815::2003
2a0a:2b43:a:5065::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