protectedfile.net
Open in
urlscan Pro
188.241.39.10
Malicious Activity!
Public Scan
Effective URL: http://protectedfile.net/ext/login/page/login.php?check&nocache=page2&alt.done=rem&docs&=gifpdf&iX411nTjUEKJ6Zisa1
Submission: On May 08 via api from CA
Summary
This is the only time protectedfile.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 188.241.39.10 188.241.39.10 | 200039 (HYDRACOM-AS) (HYDRACOM-AS) | |
7 | 216.58.206.16 216.58.206.16 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
9 | 2 |
ASN200039 (HYDRACOM-AS, GB)
PTR: cphost09.qhoster.net
protectedfile.net |
ASN15169 (GOOGLE - Google LLC, US)
PTR: fra16s20-in-f16.1e100.net
storage.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
googleapis.com
storage.googleapis.com |
777 KB |
2 |
protectedfile.net
protectedfile.net |
2 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
7 | storage.googleapis.com |
protectedfile.net
|
2 | protectedfile.net | |
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://protectedfile.net/ext/login/page/login.php?check&nocache=page2&alt.done=rem&docs&=gifpdf&iX411nTjUEKJ6Zisa1
Frame ID: 64F5562E4D9FC296DDED6C7FD7D895C1
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://protectedfile.net/ext/login/page/ Page URL
- http://protectedfile.net/ext/login/page/login.php?check&nocache=page2&alt.done=rem&docs&=gifpdf&iX411... Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://protectedfile.net/ext/login/page/ Page URL
- http://protectedfile.net/ext/login/page/login.php?check&nocache=page2&alt.done=rem&docs&=gifpdf&iX411nTjUEKJ6Zisa1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
protectedfile.net/ext/login/page/ |
119 B 369 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
protectedfile.net/ext/login/page/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zone.png
storage.googleapis.com/eciffoggbody/ |
762 KB 763 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zgml_1.png
storage.googleapis.com/offimg/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zout_1.png
storage.googleapis.com/offimg/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zaol_1.png
storage.googleapis.com/offimg/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zyhoo_1.png
storage.googleapis.com/offimg/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zoffice_1.png
storage.googleapis.com/offimg/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zothr_1.png
storage.googleapis.com/offimg/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody function| popupwnd0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
protectedfile.net
storage.googleapis.com
188.241.39.10
216.58.206.16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