therealistick.com
Open in
urlscan Pro
162.241.224.146
Malicious Activity!
Public Scan
Effective URL: https://therealistick.com/.well-known/acme-challenge/pki-validation/3114a/
Submission: On November 05 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on September 22nd 2023. Valid for: 3 months.
This is the only time therealistick.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Schweizerische Bundesbahnen (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 14 | 162.241.224.146 162.241.224.146 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
2 | 193.203.121.166 193.203.121.166 | 31004 (SBB-CFF-F...) (SBB-CFF-FFS Telecom SBB) | |
1 | 3.124.63.51 3.124.63.51 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box5191.bluehost.com
therealistick.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-124-63-51.eu-central-1.compute.amazonaws.com
cdn.app.sbb.ch |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
therealistick.com
4 redirects
therealistick.com |
223 KB |
2 |
swisspass.ch
www.swisspass.ch — Cisco Umbrella Rank: 578892 |
146 KB |
1 |
sbb.ch
cdn.app.sbb.ch — Cisco Umbrella Rank: 474592 |
14 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
14 | therealistick.com |
4 redirects
therealistick.com
|
2 | www.swisspass.ch |
therealistick.com
|
1 | cdn.app.sbb.ch |
therealistick.com
|
13 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
corporatedefenseetl.com |
www.swisspass.ch |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.therealistick.play-practice.com R3 |
2023-09-22 - 2023-12-21 |
3 months | crt.sh |
www.swisspass.ch SwissSign RSA TLS OV ICA 2021 - 1 |
2023-01-09 - 2024-01-09 |
a year | crt.sh |
*.app.sbb.ch Amazon RSA 2048 M02 |
2023-08-16 - 2024-09-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://therealistick.com/.well-known/acme-challenge/pki-validation/3114a/
Frame ID: BB1FB22BD05CF4A5E250EBD22C248779
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Login | SwissPassPage URL History Show full URLs
-
http://therealistick.com/.well-known/acme-challenge/pki-validation
HTTP 301
http://therealistick.com/.well-known/acme-challenge/pki-validation/ HTTP 301
https://therealistick.com/.well-known/acme-challenge/pki-validation/ HTTP 302
https://therealistick.com/.well-known/acme-challenge/pki-validation/3114a HTTP 301
https://therealistick.com/.well-known/acme-challenge/pki-validation/3114a/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Passwort vergessen?
Search URL Search Domain Scan URL
Title: Für SwissPass registrieren.
Search URL Search Domain Scan URL
Title: Zurück
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://therealistick.com/.well-known/acme-challenge/pki-validation
HTTP 301
http://therealistick.com/.well-known/acme-challenge/pki-validation/ HTTP 301
https://therealistick.com/.well-known/acme-challenge/pki-validation/ HTTP 302
https://therealistick.com/.well-known/acme-challenge/pki-validation/3114a HTTP 301
https://therealistick.com/.well-known/acme-challenge/pki-validation/3114a/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
therealistick.com/.well-known/acme-challenge/pki-validation/3114a/ Redirect Chain
|
67 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sso.min-20200819.css
therealistick.com/.well-known/acme-challenge/pki-validation/3114a/css/ |
180 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_text_de-20200819.svg
www.swisspass.ch//resources/img/ |
137 KB 138 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-20200819.svg
www.swisspass.ch//resources/img/ |
7 KB 8 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loader-20200819.png
therealistick.com/.well-known/acme-challenge/pki-validation/3114a/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-20200819.js.download
therealistick.com/.well-known/acme-challenge/pki-validation/3114a/js/ |
95 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.min-20200819.js.download
therealistick.com/.well-known/acme-challenge/pki-validation/3114a/js/ |
175 KB 68 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
swisspass.min-20200819.js.download
therealistick.com/.well-known/acme-challenge/pki-validation/3114a/js/ |
97 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SBBWeb-Light.woff2
cdn.app.sbb.ch/fonts/v1_6_subset/ |
14 KB 14 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icomoon.woff2
therealistick.com/.well-known/acme-challenge/fonts/icomoon/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
co-branding
therealistick.com/idp/ |
115 KB 28 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icomoon.ttf
therealistick.com/.well-known/acme-challenge/fonts/icomoon/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icomoon.woff
therealistick.com/.well-known/acme-challenge/fonts/icomoon/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Schweizerische Bundesbahnen (Transportation)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| validateForm function| closeModal function| $ function| jQuery object| jQuery1120045657020410780436 function| A11yDialog function| iFrameResize function| Cleave function| OevcResourceLoader object| dp object| oevc object| webtrends boolean| isMobile function| validate object| options object| attrs object| allowedProviders object| rememberMe boolean| providerAllowsRememberMe1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.www.swisspass.ch/ | Name: AL_SESS-S Value: Adx4rYPoqGxzPJ69kg9B7vLrfnG!LaGxAGo9SK5CYyot9EWR7ts10TUDLE7KnflsBhQ5 |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.app.sbb.ch
therealistick.com
www.swisspass.ch
162.241.224.146
193.203.121.166
3.124.63.51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