robinsiowa.icu
Open in
urlscan Pro
2400:cb00:2048:1::6818:7660
Malicious Activity!
Public Scan
Effective URL: https://robinsiowa.icu/zoz/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.12528996...
Submission: On July 16 via manual from US
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on July 16th 2018. Valid for: 6 months.
This is the only time robinsiowa.icu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2400:cb00:204... 2400:cb00:2048:1::681b:bad6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 6 | 2400:cb00:204... 2400:cb00:2048:1::6818:7660 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
6 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
zulutimezone.icu |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
robinsiowa.icu |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
robinsiowa.icu
1 redirects
robinsiowa.icu |
358 KB |
1 |
zulutimezone.icu
zulutimezone.icu |
424 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
6 | robinsiowa.icu |
1 redirects
zulutimezone.icu
robinsiowa.icu |
1 | zulutimezone.icu | |
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni11688.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-07-15 - 2019-01-21 |
6 months | crt.sh |
sni43886.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-07-16 - 2019-01-22 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://robinsiowa.icu/zoz/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-userid&userid=george.tarlas@acgnet.com
Frame ID: A90CFC79A38B753BC9A8FB64DFBA9CDB
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://zulutimezone.icu/readmon.php?userid=george.tarlas@acgnet.com Page URL
-
https://robinsiowa.icu/zoz/index.php?userid=george.tarlas@acgnet.com
HTTP 302
https://robinsiowa.icu/zoz/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.177... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://zulutimezone.icu/readmon.php?userid=george.tarlas@acgnet.com Page URL
-
https://robinsiowa.icu/zoz/index.php?userid=george.tarlas@acgnet.com
HTTP 302
https://robinsiowa.icu/zoz/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-userid&userid=george.tarlas@acgnet.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
readmon.php
zulutimezone.icu/ |
130 B 424 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
robinsiowa.icu/zoz/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
t3.png
robinsiowa.icu/zoz/images/ |
353 KB 353 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
t4.png
robinsiowa.icu/zoz/images/ |
838 B 900 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sgn.png
robinsiowa.icu/zoz/images/ |
523 B 630 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
csscheckbox_0f97b07d91ef3d2f1c0f936a59395179.png
robinsiowa.icu/zoz/images/ |
575 B 741 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.robinsiowa.icu/ | Name: __cfduid Value: d8d86e21fd5a3d420a7f1f72f4c90f54a1531776843 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
robinsiowa.icu
zulutimezone.icu
2400:cb00:2048:1::6818:7660
2400:cb00:2048:1::681b:bad6
259155392eaaa969a5d5308ea31acf59a19b9c1f6d8e0a24922d392d1a3c4ac6
3e01a0bdb6e62aade484099da32feeb2b63462d7de89b0e9ea02ae1cf1198ec2
7b73f03db4759a9a8cfe2860f5af3f4e9be1101dc03ffba61357960947092bb6
84d6a8ccb0e4f93f0ed990e4b8437f485cd5a44e2ea0ac8f7eb1e583f96d2403
d2411bbcca069ac6ab2351448046a9292904f2e5ab5196ab605851baf96ddac2
dd038c93395f25a275dbe62fb1748c5f990ce934837f654c45b00ac798a3d4e8