URL: http://nooragifts.com/ttyl/rackspaceauto/login.php
Submission: On September 16 via automatic, source phishtank

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 88.198.5.15, located in Nuremberg, Germany and belongs to HETZNER-AS, DE. The main domain is nooragifts.com.
This is the only time nooragifts.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Rackspace (Online)

Domain & IP information

IP Address AS Autonomous System
1 88.198.5.15 24940 (HETZNER-AS)
4 2
Apex Domain
Subdomains
Transfer
1 nooragifts.com
nooragifts.com
18 KB
4 1
Domain Requested by
1 nooragifts.com
4 1

This site contains links to these domains. Also see Links.

Domain
www.rackspace.com
cp.rackspace.com
apps.rackspace.com
Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://nooragifts.com/ttyl/rackspaceauto/login.php
Frame ID: 7C645C337D389918B8B31DE463A3206A
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

18 kB
Transfer

45 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
nooragifts.com/ttyl/rackspaceauto/
34 KB
18 KB
Document
General
Full URL
http://nooragifts.com/ttyl/rackspaceauto/login.php
Protocol
HTTP/1.1
Server
88.198.5.15 Nuremberg, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
cp.baseprovider.com
Software
LiteSpeed /
Resource Hash
ab33ac41b514a7db9278f622ca7b192ab3547c96bba22103e2eaba730f210c24

Request headers

Host
nooragifts.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Content-Length
18308
Content-Encoding
gzip
Vary
Accept-Encoding
Date
Wed, 16 Sep 2020 13:06:57 GMT
Server
LiteSpeed
b807933f-75eb-46b2-a62c-9a178882694e
http://nooragifts.com/
43 B
0
Image
General
Full URL
blob:http://nooragifts.com/b807933f-75eb-46b2-a62c-9a178882694e
Requested by
Host: nooragifts.com
URL: http://nooragifts.com/ttyl/rackspaceauto/login.php
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2894fa1d1ebe2f99a165317c3c46ea23a7de28590a1c3965508acaf802e9c9a8

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
43
Content-Type
image/gif
ccc74ca5-42d5-4b32-ba95-33bbd0bbbf67
http://nooragifts.com/
2 KB
0
Image
General
Full URL
blob:http://nooragifts.com/ccc74ca5-42d5-4b32-ba95-33bbd0bbbf67
Requested by
Host: nooragifts.com
URL: http://nooragifts.com/ttyl/rackspaceauto/login.php
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f167dfd881b45166119fce39b1fa639e925f80e4e7391e3cbe83f843490b7b19

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
2080
Content-Type
image/png
bd371fe4-6103-483c-80b4-d2a7a177be11
http://nooragifts.com/
9 KB
0
Image
General
Full URL
blob:http://nooragifts.com/bd371fe4-6103-483c-80b4-d2a7a177be11
Requested by
Host: nooragifts.com
URL: http://nooragifts.com/ttyl/rackspaceauto/login.php
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db18ad437ed30b29a15bb4a394df2f29cd5073ccab904b6ed5e2cf870530dc62

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
9209
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Rackspace (Online)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| savepage_PageLoader

0 Cookies