nuton-electro.ru
Open in
urlscan Pro
62.152.56.140
Malicious Activity!
Public Scan
Effective URL: https://nuton-electro.ru/auu/
Submission: On August 24 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on July 12th 2023. Valid for: 3 months.
This is the only time nuton-electro.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 162.241.225.201 162.241.225.201 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
11 | 62.152.56.140 62.152.56.140 | 3175 (CITYTELEC...) (CITYTELECOM-MSK) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 74.125.68.95 74.125.68.95 | 15169 (GOOGLE) (GOOGLE) | |
3 | 142.250.4.94 142.250.4.94 | 15169 (GOOGLE) (GOOGLE) | |
16 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box5289.bluehost.com
mail.eileenmeyerbarbarach.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
nuton-electro.ru
nuton-electro.ru |
153 KB |
3 |
gstatic.com
fonts.gstatic.com |
47 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 45 |
1 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 231 |
438 KB |
1 |
eileenmeyerbarbarach.com
1 redirects
mail.eileenmeyerbarbarach.com |
296 B |
16 | 5 |
Domain | Requested by | |
---|---|---|
11 | nuton-electro.ru |
nuton-electro.ru
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
nuton-electro.ru
|
1 | cdnjs.cloudflare.com |
nuton-electro.ru
|
1 | mail.eileenmeyerbarbarach.com | 1 redirects |
16 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
nuton-electro.ru R3 |
2023-07-12 - 2023-10-10 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-07-31 - 2023-10-23 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-07-31 - 2023-10-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://nuton-electro.ru/auu/
Frame ID: 45A902CEA8D711815B0D6F6FA6430841
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Sign in with myGov - myGovPage URL History Show full URLs
-
https://mail.eileenmeyerbarbarach.com/aus/
HTTP 302
https://nuton-electro.ru/auu/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mail.eileenmeyerbarbarach.com/aus/
HTTP 302
https://nuton-electro.ru/auu/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
nuton-electro.ru/auu/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
nuton-electro.ru/auu/css/ |
188 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
test.css
nuton-electro.ru/auu/css/ |
1 KB 858 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
html5shiv.min.js
nuton-electro.ru/auu/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
respond.min.js
nuton-electro.ru/auu/js/ |
4 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.js
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0/js/ |
1 MB 438 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
nuton-electro.ru/auu/image/ |
63 KB 24 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
or.png
nuton-electro.ru/auu/image/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_ft.svg
nuton-electro.ru/auu/image/ |
63 KB 24 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.5.1.min.js
nuton-electro.ru/auu/js/ |
87 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
nuton-electro.ru/auu/js/ |
61 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
nuton-electro.ru/auu/js/ |
23 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
13 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| html5 object| respond object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome function| $ function| jQuery number| uidEvent object| bootstrap2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mail.eileenmeyerbarbarach.com/ | Name: PHPSESSID Value: 03eb443ead02f8fb6addc55a42d69b52 |
|
nuton-electro.ru/ | Name: PHPSESSID Value: d2fnqapab1h7brgfkvpuh84nfs |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
mail.eileenmeyerbarbarach.com
nuton-electro.ru
104.17.25.14
142.250.4.94
162.241.225.201
62.152.56.140
74.125.68.95
0c159070e198b7ed2a9162d6c9751f5914ff62803914d8512d60b1f5ffde4334
10b11a7c97b90bcf7ad520ac94c5769d08540ce1ee3b84d487c587bf128e3388
1944a255577a8ed66ae984c6f6356281ff6f29dc84a2af6f1facf258c7dab62e
2909d4fa86cf09191e768576e1a6eab7f2635a2627549c45d29595ffac9c0da9
65ee67a902770fbfc8da4880ca15e15275ffce3c253829c195cd5bfdcece4376
75ca5d1ab7947e7c19b4914a8ebaf31f5ef8547fee7fe3c4b49125fa9159fee4
954aa858b3bffb8511bc41bc88b07d2b24597c37faf522550e26c9aa3b0d220d
a199620fe981df00a825f78761d3f7c8870f8117daa4a890e08018dec386dae8
b019538234514166ec7665359d097403358f8a4c991901983922fb4d56989f1e
b92f631c8cf38be6724c9b0ef9dcc762b7314ee2197ced3608efb40e02618fac
ba70169dabe8b8ec2aa64745029732e270792a06b4309ad9d3313ad759686b58
d7204bc4089e5dce89964f8b35f2f5968ae13113e3f09c9e550b5a50a11b7643
dc9cbf19b48bae0d28f72e59e67d6ec34ab1644087ec2e8e42954180d1586b48
f5aebdfea35d1e7656ef4acc5db1f243209755ae3300943ef8fc6280f363c860
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d