www.rajindrapublicschool.com
Open in
urlscan Pro
204.11.58.33
Malicious Activity!
Public Scan
Submission: On December 14 via manual from US
Summary
This is the only time www.rajindrapublicschool.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Mimecast (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 204.11.58.33 204.11.58.33 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY - PDR) | |
9 | 1 |
ASN394695 (PUBLIC-DOMAIN-REGISTRY - PDR, US)
PTR: bh-47.webhostbox.net
www.rajindrapublicschool.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
rajindrapublicschool.com
www.rajindrapublicschool.com |
672 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | www.rajindrapublicschool.com |
www.rajindrapublicschool.com
|
9 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.mimecast.com |
community.mimecast.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.rajindrapublicschool.com/js/dd/indexa.html
Frame ID: 4B321890FCDD46652635FEDC39B6A2DB
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
Ruby (Programming Languages) ExpandDetected patterns
- headers server /(?:mod_rails|mod_rack|Phusion(?:\.|_)Passenger)/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Ruby on Rails (Web Frameworks) Expand
Detected patterns
- headers server /(?:mod_rails|mod_rack|Phusion(?:\.|_)Passenger)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Home
Search URL Search Domain Scan URL
Title: Login Issues?
Search URL Search Domain Scan URL
Title: Knowledge Base
Search URL Search Domain Scan URL
Title: Contact Support
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
indexa.html
www.rajindrapublicschool.com/js/dd/ |
596 KB 596 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
entypo.css
www.rajindrapublicschool.com/js/dd/css/ |
17 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.css
www.rajindrapublicschool.com/js/dd/css/ |
28 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mimecast-icons.css
www.rajindrapublicschool.com/js/dd/css/ |
9 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lang-en.js
www.rajindrapublicschool.com/js/dd/language/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mimecast-logo.png
www.rajindrapublicschool.com/js/dd/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon.png
www.rajindrapublicschool.com/js/dd/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cache.8b491007eddcd5fdae29f1861a2e6087.login-lib.js
www.rajindrapublicschool.com/js/dd/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cache.dea4dfc31e8167b56ab9a4ed7bf81bbb.login.js
www.rajindrapublicschool.com/js/dd/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Mimecast (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| branding string| rootPath string| dirPath string| urlPrefix string| grid object| appsConfig object| appMessagesConfig string| appversion0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.rajindrapublicschool.com
204.11.58.33
3fa3a17b8560b8e303917887ee40d3c04148b6dfdc515d00e24da39229780eb2
6b1b9984bfc74a413dd3ac21da53a36cc294b52b2e3848055fd949650e1e1e7b
7a24726189ec811cbf06e22aaabffbb801ac7053ab29639db0be79d4f1806c1d
8d831ec89aebeacb5781cac02ed7dd2ac5fe54dd813f9b34ef53a8b804761c9a
c374efba54279628793f04e10ebf5d0c1b4dbc36b3f4132d9235f01d64ca5c8e
ef587b35dbe3ea9ebf4a881ff61d42154b7bf6b6f1f8894917375612f9a03f61