test.civyinc.com
Open in
urlscan Pro
128.199.20.153
Malicious Activity!
Public Scan
Effective URL: https://test.civyinc.com/wp-content/uploads/Netklox/2371c8900fad351/login.php
Submission: On March 04 via manual from MA
Summary
TLS certificate: Issued by R3 on March 1st 2021. Valid for: 3 months.
This is the only time test.civyinc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 128.199.20.153 128.199.20.153 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
civyinc.com
1 redirects
test.civyinc.com |
1 MB |
12 | 1 |
Domain | Requested by | |
---|---|---|
13 | test.civyinc.com |
1 redirects
test.civyinc.com
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
test.civyinc.com R3 |
2021-03-01 - 2021-05-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://test.civyinc.com/wp-content/uploads/Netklox/2371c8900fad351/login.php
Frame ID: 51F71582FE0878B54865E99BEE7058F9
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://test.civyinc.com/wp-content/uploads/Netklox/
HTTP 302
https://test.civyinc.com/wp-content/uploads/Netklox/2371c8900fad351/login.php Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<script[^>]* src=[^>]+fontawesome(?:\.js)?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://test.civyinc.com/wp-content/uploads/Netklox/
HTTP 302
https://test.civyinc.com/wp-content/uploads/Netklox/2371c8900fad351/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
test.civyinc.com/wp-content/uploads/Netklox/2371c8900fad351/ Redirect Chain
|
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
test.civyinc.com/wp-content/uploads/Netklox/assets/css/ |
152 KB 152 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
helpers.css
test.civyinc.com/wp-content/uploads/Netklox/assets/css/ |
41 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
test.civyinc.com/wp-content/uploads/Netklox/assets/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
test.civyinc.com/wp-content/uploads/Netklox/assets/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fbbb.png
test.civyinc.com/wp-content/uploads/Netklox/assets/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
test.civyinc.com/wp-content/uploads/Netklox/assets/js/ |
86 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
test.civyinc.com/wp-content/uploads/Netklox/assets/js/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
test.civyinc.com/wp-content/uploads/Netklox/assets/js/ |
59 KB 59 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome.min.js
test.civyinc.com/wp-content/uploads/Netklox/assets/js/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
test.civyinc.com/wp-content/uploads/Netklox/assets/js/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img.jpg
test.civyinc.com/wp-content/uploads/Netklox/assets/images/ |
111 KB 111 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| Popper object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome boolean| isShift string| seperator string| dash function| cc_date function| date_of_birth1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
test.civyinc.com/ | Name: PHPSESSID Value: dg8ech5mq1j4lnkktft97gujnr |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
test.civyinc.com
128.199.20.153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