royalaqua.mx
Open in
urlscan Pro
65.99.252.171
Malicious Activity!
Public Scan
Effective URL: https://royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/
Submission: On March 13 via api from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on February 14th 2018. Valid for: 3 months.
This is the only time royalaqua.mx was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DocuSign (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 192.185.5.194 192.185.5.194 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
11 | 65.99.252.171 65.99.252.171 | 36024 (AS-TIERP-...) (AS-TIERP-36024 - TierPoint) | |
12 | 2 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: ns8067.hostgator.com
brokerockers.com |
ASN36024 (AS-TIERP-36024 - TierPoint, LLC, US)
PTR: hv2svg046.neubox.net
royalaqua.mx |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
royalaqua.mx
royalaqua.mx |
507 KB |
1 |
brokerockers.com
brokerockers.com |
5 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
11 | royalaqua.mx |
royalaqua.mx
|
1 | brokerockers.com | |
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
royalaqua.mx cPanel, Inc. Certification Authority |
2018-02-14 - 2018-05-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/
Frame ID: 536F5AC1823E3B4087D8FCC1C6090317
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://brokerockers.com/mz.php?s=k Page URL
- https://royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/ Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://brokerockers.com/mz.php?s=k Page URL
- https://royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
mz.php
brokerockers.com/ |
12 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a1.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a6.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a7.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
923 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a2.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
115 KB 115 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a3.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
66 KB 66 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a4.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
69 KB 69 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a9.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
32 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a8.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
163 KB 163 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a5.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a10.png
royalaqua.mx/components/com_k2/docusignupdated/docusign/Validation/images/ |
40 KB 40 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DocuSign (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
brokerockers.com
royalaqua.mx
192.185.5.194
65.99.252.171
01d1133fab88c92ff7978d0b33a73e5797a75a117eaf48e7570904c42e129f67
1458c870deb4242d1b55ac22360ecf4205e17a8a8e6b0c53ef06598df57e15a6
2d440edfc560672d899b972f5fe523141c845da22df0b2d824b087438a4e4158
4047252a447f3da5867678c07a612c5cd15800fc2d5949dee81419994699e8c4
5e602d9a4a19fb9dcb4b9d5d503459097a9cb7a59c6877c08f99bd3cf9d22809
763163e86cc170fe5b9ef8a1fdcca3bc30a9355179eedb847cfe8ccedec885c3
7c234fc0ec732f44f01b1a0c4decbf651051fa05c881411ff55eb7c99dd704ee
824a6f09f1d0539819cd390534ce978a166bf51b81f875511f9afb70b833dae8
aa8ee98f515cada0fab75e6b1314d9d38ad43b822571b3dfb5a960392c04174d
efdabd2b79991efb0cc7edccb4fcd14474aff2dcf9c9ce5dcb90e0cea64a6954
f082ddeec32b9fc26d35466aa4f6fba703897e98dec12dcb4f7ce5b6fc30aac4