palmrockschool.com
Open in
urlscan Pro
50.31.160.239
Malicious Activity!
Public Scan
Effective URL: http://palmrockschool.com/jpf/KfQAkff/
Submission: On April 08 via manual from GB
Summary
This is the only time palmrockschool.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.213.164.114 52.213.164.114 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
11 | 50.31.160.239 50.31.160.239 | 23352 (SERVERCEN...) (SERVERCENTRAL - Server Central Network) | |
12 | 2 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-52-213-164-114.eu-west-1.compute.amazonaws.com
mandrillapp.com |
ASN23352 (SERVERCENTRAL - Server Central Network, US)
PTR: unknown.servercentral.net
palmrockschool.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
palmrockschool.com
palmrockschool.com |
176 KB |
1 |
mandrillapp.com
1 redirects
mandrillapp.com |
637 B |
0 |
whatsmyip.us
Failed
www.whatsmyip.us Failed |
|
12 | 3 |
Domain | Requested by | |
---|---|---|
11 | palmrockschool.com |
palmrockschool.com
|
1 | mandrillapp.com | 1 redirects |
0 | www.whatsmyip.us Failed |
palmrockschool.com
|
12 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.whatsmyip.us |
globalbuyersonline.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://palmrockschool.com/jpf/KfQAkff/
Frame ID: EE9A2B67831038FE3784C1C18FA51755
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://mandrillapp.com/track/click/30927887/palmrockschool.com?p=eyJzIjoiUEZPVzVpbFhmS3hGMlVKYVNPQz...
HTTP 302
http://palmrockschool.com/jpf/KfQAkff/ Page URL
Detected technologies
OpenSSL (Web Server Extensions) ExpandDetected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
CloudFlare (CDN) Expand
Detected patterns
- env /^CloudFlare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: IP
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mandrillapp.com/track/click/30927887/palmrockschool.com?p=eyJzIjoiUEZPVzVpbFhmS3hGMlVKYVNPQzhPRFlvMEtvIiwidiI6MSwicCI6IntcInVcIjozMDkyNzg4NyxcInZcIjoxLFwidXJsXCI6XCJodHRwOlxcXC9cXFwvcGFsbXJvY2tzY2hvb2wuY29tXFxcL2pwZlxcXC9LZlFBa2ZmXFxcL1wiLFwiaWRcIjpcIjNiNGJlNzBjNGU2ZTRmNzBhODEwNTAyYTc0NzIzNTEzXCIsXCJ1cmxfaWRzXCI6W1wiNmU4NmY4OTExYTQyMWRkYzBhNmZmZDQyM2VmNzlhYWRjODRlMjEyMlwiXX0ifQ
HTTP 302
http://palmrockschool.com/jpf/KfQAkff/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
palmrockschool.com/jpf/KfQAkff/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.css
palmrockschool.com/jpf/KfQAkff/javascript/facebox/src/ |
1 KB 793 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.6.2.min.js
palmrockschool.com/jpf/KfQAkff/javascript/ |
89 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.js
palmrockschool.com/jpf/KfQAkff/javascript/facebox/src/ |
9 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.watermark.js
palmrockschool.com/jpf/KfQAkff/javascript/watermark/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
javascript1.js
palmrockschool.com/jpf/KfQAkff/javascript/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhl%20image.jpg
palmrockschool.com/jpf/KfQAkff/img/ |
28 KB 28 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhlim1.jpg
palmrockschool.com/jpf/KfQAkff/img/ |
72 KB 72 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
showipsimple.php
www.whatsmyip.us/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhl.jpg
palmrockschool.com/jpf/KfQAkff/img/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
static-logo.jpg
palmrockschool.com/jpf/KfQAkff/img/ |
27 KB 27 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cloudflare.min.js
palmrockschool.com/ajax.cloudflare.com/cdn-cgi/nexp/dok3v%3d919620257c/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.whatsmyip.us
- URL
- http://www.whatsmyip.us/showipsimple.php
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)28 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| CloudFlare function| $ function| jQuery object| jQuery1620993520582333022 function| script function| click_to_download function| make_the_delay function| redirect_the function| now_download function| MM_reloadPage function| updateclock function| WorldClock number| zone boolean| isitlocal string| ampm object| now number| ofst number| secs number| sec number| mins number| min number| hr number| hrs string| statusampm number| hr20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mandrillapp.com
palmrockschool.com
www.whatsmyip.us
www.whatsmyip.us
50.31.160.239
52.213.164.114
016f9cfa001792db7ad2be1e1ea1424cea09f108f68e7efb1caf4c5e65ac1335
47b6b590aa552d72bf7f77997403d9a3a739fa9d795737c99b0c9057cd1a02a1
4fd220434d37eda069ab40a66a6242d586cb3ff5424070dc30c8699d20c3dc44
9a2a983c9ea36e030b6ee8f7f08a2d966fed84f445af2710fcc49dd98b37e832
bed212ed0d3a0e3ad5efbacf3a6e93a2b3498513a7fac7d627f562d1276f2003
d16d07a0353405fcec95f7efc50a2621bc7425f9a5e8895078396fb0dc460c4f
f1623225d55c29bd8661b2329e207d51286142a931725c573505c0bfa5c2198a
f86ea9862ff2a73d5513567d3b98dab234e1637f3401678d52fbabe3131f9f76
fc1051ff8ece6493b643873b420df97c3cb5037337891450cad3051a9bba1754
fd9249bcb8bf277f4db71cbc03a12f1b39b4da133e4661e3a72be3baf5303623