www.aluno.soibge.com
Open in
urlscan Pro
192.99.62.23
Malicious Activity!
Public Scan
Effective URL: https://www.aluno.soibge.com/protege/
Submission: On February 23 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by aluno.soibge.com on February 23rd 2021. Valid for: a year.
This is the only time www.aluno.soibge.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 192.99.62.23 192.99.62.23 | 16276 (OVH) (OVH) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
soibge.com
1 redirects
www.aluno.soibge.com |
245 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
14 | www.aluno.soibge.com |
1 redirects
www.aluno.soibge.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
aluno.soibge.com aluno.soibge.com |
2021-02-23 - 2022-02-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.aluno.soibge.com/protege/
Frame ID: 5D9C8E89CC1C1BE1C3B7F7A07448998D
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.aluno.soibge.com/
HTTP 302
https://www.aluno.soibge.com/protege/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.aluno.soibge.com/
HTTP 302
https://www.aluno.soibge.com/protege/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.aluno.soibge.com/protege/ Redirect Chain
|
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap4.3.css
www.aluno.soibge.com/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
util.css
www.aluno.soibge.com/protege/css/ |
85 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.aluno.soibge.com/protege/css/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lib.css
www.aluno.soibge.com/lib_js/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.aluno.soibge.com/site/images/ |
318 B 318 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
www.aluno.soibge.com/protege/vendor/jquery/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lib.min.js
www.aluno.soibge.com/lib_js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
www.aluno.soibge.com/protege/js/ |
2 KB 1005 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Poppins-Bold.ttf
www.aluno.soibge.com/protege/fonts/poppins/ |
138 KB 65 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Poppins-Regular.ttf
www.aluno.soibge.com/protege/fonts/poppins/ |
142 KB 66 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Poppins-Medium.ttf
www.aluno.soibge.com/protege/fonts/poppins/ |
140 KB 66 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lib.min.js
www.aluno.soibge.com/lib_js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| callBack string| urlModal1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.aluno.soibge.com/ | Name: PHPSESSID Value: m4qpi3nur5b836jan58ojkbl16 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.aluno.soibge.com
192.99.62.23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