![](/screenshots/3569153b-4243-42d0-aed9-75feafaca9f8.png)
www.regalcommunication.net
Open in
urlscan Pro
103.169.160.74
Malicious Activity!
Public Scan
Submission: On March 08 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 4th 2024. Valid for: 3 months.
This is the only time www.regalcommunication.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 103.169.160.74 103.169.160.74 | 148993 (DIANAHOST...) (DIANAHOSTLTD-AS-AP Diana Host Ltd) | |
1 2 | 2606:4700:303... 2606:4700:3032::ac43:a726 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2a06:98c1:312... 2a06:98c1:3121::9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3032::6815:4de5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 51.77.64.70 51.77.64.70 | 16276 (OVH) (OVH) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | () () | |
19 | 9 |
ASN148993 (DIANAHOSTLTD-AS-AP Diana Host Ltd, BD)
PTR: server9.serverdiana.com
www.regalcommunication.net |
ASN13335 (CLOUDFLARENET, US)
tguy6fuxedo.flgalgtop.online |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
jgakgalga.online
zs3klp9r61e.jgakgalga.online |
494 KB |
2 |
amios.shop
1 redirects
amios.shop |
10 KB |
1 |
msftauth.net
aadcdn.msftauth.net |
753 B |
1 |
ip-api.com
pro.ip-api.com — Cisco Umbrella Rank: 5774 |
427 B |
1 |
flgalgtop.online
tguy6fuxedo.flgalgtop.online |
193 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 228 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
78 KB |
1 |
regalcommunication.net
www.regalcommunication.net |
1 KB |
19 | 8 |
Domain | Requested by | |
---|---|---|
12 | zs3klp9r61e.jgakgalga.online |
code.jquery.com
|
2 | amios.shop |
1 redirects
www.regalcommunication.net
|
1 | aadcdn.msftauth.net | |
1 | pro.ip-api.com |
code.jquery.com
|
1 | tguy6fuxedo.flgalgtop.online | |
1 | cdnjs.cloudflare.com |
www.regalcommunication.net
|
1 | code.jquery.com |
www.regalcommunication.net
|
1 | www.regalcommunication.net | |
19 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.regalcommunication.net R3 |
2024-02-04 - 2024-05-04 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
jgakgalga.online GTS CA 1P5 |
2024-02-18 - 2024-05-18 |
3 months | crt.sh |
flgalgtop.online GTS CA 1P5 |
2024-02-19 - 2024-05-19 |
3 months | crt.sh |
*.ip-api.com Sectigo RSA Domain Validation Secure Server CA |
2023-12-21 - 2025-01-20 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.regalcommunication.net/information/title/pro.htm
Frame ID: 293ADC984714DD030F549610F0910C5C
Requests: 20 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://amios.shop/rrb?i=67216239 HTTP 301
- https://amios.shop/rrb/?i=67216239
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pro.htm
www.regalcommunication.net/information/title/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
amios.shop/rrb/ Redirect Chain
|
20 KB 9 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
zs3klp9r61e.jgakgalga.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
tguy6fuxedo.flgalgtop.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
pro.ip-api.com/json/ |
271 B 427 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
zs3klp9r61e.jgakgalga.online/obufsssssssscaaatoion/ |
2 MB 220 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
69 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 753 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
zs3klp9r61e.jgakgalga.online/static/media/microsoft_logo.png/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
key_workshcool.png
zs3klp9r61e.jgakgalga.online/static/media/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
person_workshcool.png
zs3klp9r61e.jgakgalga.online/static/media/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
person_office.png
zs3klp9r61e.jgakgalga.online/static/media/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
message_think.png
zs3klp9r61e.jgakgalga.online/static/media/ |
810 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
auth_number.png
zs3klp9r61e.jgakgalga.online/static/media/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
call_2fa.png
zs3klp9r61e.jgakgalga.online/static/media/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2fa_authenticator.png
zs3klp9r61e.jgakgalga.online/static/media/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
godaddy-left.png
zs3klp9r61e.jgakgalga.online/static/media/ |
29 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bg_normal.png
zs3klp9r61e.jgakgalga.online/static/media/ |
19 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)39 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Dliog object| script function| _0x31c8 function| _0x2dd6 string| chain string| code function| _0x486063 function| _0x3c6ac8 function| _0x3713e3 function| _0x2d0480 function| _0x3b668a function| _0x5d5152 function| _0x4256ba function| _0xa86b94 function| _0x791f33 function| _0x53f5e7 function| _0x5ed599 function| _0x35ba1c function| _0x555091 function| _0x50a77a function| _0xdf1035 function| _0x594f6e function| _0x30f641 function| _0x9bd84f object| div1 function| _0x3e98 string| Page_type string| IGOBZL string| cbbg function| _0x40fb string| CIdLSdeu string| kaka90nal string| ka45k459final2 string| kak0011afinal string| getjsonnn number| countttingerr object| CryptoJS function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
amios.shop
cdnjs.cloudflare.com
code.jquery.com
pro.ip-api.com
tguy6fuxedo.flgalgtop.online
www.regalcommunication.net
zs3klp9r61e.jgakgalga.online
103.169.160.74
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2606:4700:3032::6815:4de5
2606:4700:3032::ac43:a726
2606:4700::6811:190e
2a04:4e42::649
2a06:98c1:3121::9
51.77.64.70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