www.littlesmonsters.com
Open in
urlscan Pro
35.231.182.221
Malicious Activity!
Public Scan
Effective URL: https://www.littlesmonsters.com/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com&ENCRYPTID=Encrypted_&_Secured_File_...
Submission: On January 18 via manual from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on January 17th 2019. Valid for: 3 months.
This is the only time www.littlesmonsters.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2001:4860:480... 2001:4860:4802:38::15 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 7 | 35.231.182.221 35.231.182.221 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2606:4700::68... 2606:4700::6813:c497 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
10 | 4 |
ASN15169 (GOOGLE - Google LLC, US)
PTR: 221.182.231.35.bc.googleusercontent.com
www.littlesmonsters.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
stackpath.bootstrapcdn.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
littlesmonsters.com
1 redirects
www.littlesmonsters.com |
122 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
35 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
1 |
h1net.net
1 redirects
h1net.net |
311 B |
10 | 5 |
Domain | Requested by | |
---|---|---|
7 | www.littlesmonsters.com |
1 redirects
www.littlesmonsters.com
|
2 | stackpath.bootstrapcdn.com |
www.littlesmonsters.com
|
1 | cdnjs.cloudflare.com |
www.littlesmonsters.com
|
1 | code.jquery.com |
www.littlesmonsters.com
|
1 | h1net.net | 1 redirects |
10 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
littlesmonsters.com cPanel, Inc. Certification Authority |
2019-01-17 - 2019-04-17 |
3 months | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-09-22 - 2019-03-31 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.littlesmonsters.com/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com&ENCRYPTID=Encrypted_&_Secured_File_Directory=2af77d455034cbc9b86497ca1cfe0dde91b05ce7
Frame ID: 6B4DAEDC9D34124B37AA275A1B966485
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://h1net.net/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com
HTTP 301
https://www.littlesmonsters.com/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com HTTP 302
https://www.littlesmonsters.com/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com&ENCRYPTID=Encry... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://h1net.net/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com
HTTP 301
https://www.littlesmonsters.com/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com HTTP 302
https://www.littlesmonsters.com/HSBC-file-secure-download/index.php?email=abc.xyz@abcxyz.com&ENCRYPTID=Encrypted_&_Secured_File_Directory=2af77d455034cbc9b86497ca1cfe0dde91b05ce7 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
www.littlesmonsters.com/HSBC-file-secure-download/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.1.3/css/ |
138 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile.css
www.littlesmonsters.com/HSBC-file-secure-download/scripts/ |
359 B 599 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.png
www.littlesmonsters.com/HSBC-file-secure-download/assets/ |
90 KB 90 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.littlesmonsters.com/HSBC-file-secure-download/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.png
www.littlesmonsters.com/HSBC-file-secure-download/assets/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
comodo_secure_seal_113x59_transp.png
www.littlesmonsters.com/HSBC-file-secure-download/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.3/umd/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 14 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| Popper object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
h1net.net
stackpath.bootstrapcdn.com
www.littlesmonsters.com
2001:4860:4802:38::15
205.185.208.52
209.197.3.15
2606:4700::6813:c497
35.231.182.221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