docsview.unaux.com
Open in
urlscan Pro
185.27.134.232
Malicious Activity!
Public Scan
Effective URL: http://docsview.unaux.com/asy/step.php
Submission: On November 22 via manual from US
Summary
This is the only time docsview.unaux.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 185.27.134.232 185.27.134.232 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
13 | 2 |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: 23213427185.ifastnet.org
docsview.unaux.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
unaux.com
docsview.unaux.com |
558 KB |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | docsview.unaux.com |
docsview.unaux.com
|
1 | www.sitepoint.com |
docsview.unaux.com
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sitepoint.com SSL.com Premium EV CA |
2018-08-07 - 2019-09-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://docsview.unaux.com/asy/step.php
Frame ID: 6EB38AAED0BC6A105F4D65F6FFDD34BA
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://docsview.unaux.com/asy/login.php?cmd\=login_submit&id\=02e760a2de8eecb62dc374ec52aab59f02e7... Page URL
- http://docsview.unaux.com/asy/login.php?cmd=login_submit&id=02e760a2de8eecb62dc374ec52aab59f02e760... Page URL
- http://docsview.unaux.com/asy/step.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://docsview.unaux.com/asy/login.php?cmd\=login_submit&id\=02e760a2de8eecb62dc374ec52aab59f02e760a2de8eecb62dc374ec52aab59f&session\=02e760a2de8eecb62dc374ec52aab59f02e760a2de8eecb62dc374ec52aab59f Page URL
- http://docsview.unaux.com/asy/login.php?cmd=login_submit&id=02e760a2de8eecb62dc374ec52aab59f02e760a2de8eecb62dc374ec52aab59f&session=02e760a2de8eecb62dc374ec52aab59f02e760a2de8eecb62dc374ec52aab59f&i=1 Page URL
- http://docsview.unaux.com/asy/step.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
login.php
docsview.unaux.com/asy/ |
1011 B 891 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aes.js
docsview.unaux.com/ |
30 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.php
docsview.unaux.com/asy/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.png
docsview.unaux.com/asy/files/ |
120 KB 120 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prf.png
docsview.unaux.com/asy/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2nd.png
docsview.unaux.com/asy/files/ |
133 KB 134 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3rd.png
docsview.unaux.com/asy/files/ |
147 KB 148 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
step.php
docsview.unaux.com/asy/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ot_1.png
docsview.unaux.com/asy/images/ |
59 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ot_2.png
docsview.unaux.com/asy/images/ |
16 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ot_4.gif
docsview.unaux.com/asy/images/ |
41 KB 41 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
but.png
docsview.unaux.com/asy/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
docsview.unaux.com/ | Name: __test Value: 3e52d3e6df9db9c98b500625ba0f4192 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
docsview.unaux.com
www.sitepoint.com
185.27.134.232
54.148.84.95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