vrukshamontessori.com
Open in
urlscan Pro
173.254.29.33
Malicious Activity!
Public Scan
Effective URL: https://vrukshamontessori.com/.well-known/acme-challenge/net/login.php
Submission: On November 20 via manual from CA — Scanned from CA
Summary
TLS certificate: Issued by R3 on September 26th 2023. Valid for: 3 months.
This is the only time vrukshamontessori.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 136.243.150.82 136.243.150.82 | 24940 (HETZNER-AS) (HETZNER-AS) | |
2 12 | 173.254.29.33 173.254.29.33 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 45.57.90.1 45.57.90.1 | () () | |
12 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: just2056.justhost.com
vrukshamontessori.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
vrukshamontessori.com
2 redirects
vrukshamontessori.com |
231 KB |
1 |
nflxext.com
assets.nflxext.com |
72 KB |
1 |
qandala.hu
qandala.hu |
447 B |
12 | 3 |
Domain | Requested by | |
---|---|---|
12 | vrukshamontessori.com |
2 redirects
vrukshamontessori.com
|
1 | assets.nflxext.com |
vrukshamontessori.com
|
1 | qandala.hu | |
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpcalendars.qandala.hu R3 |
2023-11-14 - 2024-02-12 |
3 months | crt.sh |
cpanel.vrukshamontessori.com R3 |
2023-09-26 - 2023-12-25 |
3 months | crt.sh |
*.1.nflxso.net DigiCert Secure Site ECC CA-1 |
2023-11-13 - 2023-12-18 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://vrukshamontessori.com/.well-known/acme-challenge/net/login.php
Frame ID: BE91CFEE76107FB90DC0D4C5D6E82881
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
NetflixPage URL History Show full URLs
- https://qandala.hu/oies.html Page URL
-
https://vrukshamontessori.com/.well-known/acme-challenge/
HTTP 302
https://vrukshamontessori.com/.well-known/acme-challenge/net/ HTTP 302
https://vrukshamontessori.com/.well-known/acme-challenge/net/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Modernizr (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://qandala.hu/oies.html Page URL
-
https://vrukshamontessori.com/.well-known/acme-challenge/
HTTP 302
https://vrukshamontessori.com/.well-known/acme-challenge/net/ HTTP 302
https://vrukshamontessori.com/.well-known/acme-challenge/net/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
oies.html
qandala.hu/ |
205 B 447 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
vrukshamontessori.com/.well-known/acme-challenge/net/ Redirect Chain
|
9 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
none.css
vrukshamontessori.com/.well-known/acme-challenge/net/files/css/ |
145 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
none2.css
vrukshamontessori.com/.well-known/acme-challenge/net/files/css/ |
163 KB 35 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
vrukshamontessori.com/.well-known/acme-challenge/net/files/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
vrukshamontessori.com/.well-known/acme-challenge/net/files/js/ |
85 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.ccvalid.js
vrukshamontessori.com/.well-known/acme-challenge/net/files/js/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
vrukshamontessori.com/.well-known/acme-challenge/net/files/js/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
vrukshamontessori.com/.well-known/acme-challenge/net/files/img/ |
117 KB 117 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
vrukshamontessori.com/.well-known/acme-challenge/net/files/img/ |
864 B 583 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.png
vrukshamontessori.com/.well-known/acme-challenge/net/files/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-93.woff
assets.nflxext.com/ffe/siteui/fonts/ |
72 KB 72 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| html5 object| Modernizr function| $ function| jQuery object| $jscomp function| isEmail1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vrukshamontessori.com/ | Name: PHPSESSID Value: f530ad1ed923d89161f49790971a6348 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
qandala.hu
vrukshamontessori.com
136.243.150.82
173.254.29.33
45.57.90.1
100814dc5c52364fc6383b92760f5061575299c3e5ab52a8faf71160e9d7aca4
38c89b667f0b98ab618ce6eef2947a58b9cac93e4dce667fec781562c34cd66e
3e49d9dc43267590184389ab3da0cb9f7308c9c848667dab109a0f7c73450ece
718ba7d3355823ebbe2c426b1ae70f3eb699aa50a9942a8df936cf10148df0cf
72b3228cb98385052ac5e8e287ad5e563cd7e4f7943bfc23090dc9c4776e72dd
8603b20b548270423fb03c2138c16f5f863ead4c48eb0999167df869e2eef8a6
8a421d5798accee1c284865ac05cee792ad3f6bcb3c70ce1dcb954d23e86fdad
98713b53a74ebe7e326353080c5f1653e83af61d6363c0b3c4c67d6d24197b4d
996606e12517e3bb57e0a5f01fed3d7144e2d07a4d8076717a90285c351fa835
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
ca83477931d09aca84c55e779bb2e6ef502b1af1bef668de771b8209a43eb11b
cde4074549e72df2b148594b13728b01118887d02d99e5e7d67c5d1e54cc6669