innos.work
Open in
urlscan Pro
173.247.242.83
Malicious Activity!
Public Scan
Submission: On February 22 via manual from SG — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on January 14th 2022. Valid for: 3 months.
This is the only time innos.work was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 173.247.242.83 173.247.242.83 | 17139 (NETRANGE) (NETRANGE) | |
1 | 2a00:1450:400... 2a00:1450:4001:811::200a | 15169 (GOOGLE) (GOOGLE) | |
14 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
innos.work
1 redirects
innos.work |
640 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 250 |
31 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
14 | innos.work |
1 redirects
innos.work
|
1 | ajax.googleapis.com |
innos.work
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
innos.work cPanel, Inc. Certification Authority |
2022-01-14 - 2022-04-14 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://innos.work/wgc/home/
Frame ID: ABE443BE9BB5107C9B9E1DB4F9342372
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Checkpoint - Office 356Page URL History Show full URLs
-
https://innos.work/wgc/home
HTTP 301
https://innos.work/wgc/home/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://innos.work/wgc/home
HTTP 301
https://innos.work/wgc/home/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
innos.work/wgc/home/ Redirect Chain
|
18 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eui_theme_amsterdam_light.css
innos.work/wgc/sources/ |
473 KB 473 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme_only_light.bc.css
innos.work/wgc/sources/ |
9 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
innos.work/wgc/sources/ |
133 KB 133 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lago.svg
innos.work/wgc/sources/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
teams.svg
innos.work/wgc/sources/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.0/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
360 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2a26d6a310a7b67e6739.svg
innos.work/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
454815cbdaefbbaf4e46.svg
innos.work/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0f1202cb539ddbfd79a2.svg
innos.work/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2a09564c896c9638aad8.woff2
innos.work/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a4f5fc610111fb0c75e7.woff2
innos.work/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b99566ba2cf87a0df500.woff
innos.work/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
223485e3f4a5c75042fa.woff
innos.work/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
innos.work/ | Name: PHPSESSID Value: 7966ed308c55793294626e865cc3d2ed |
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
innos.work
173.247.242.83
2a00:1450:4001:811::200a
5429aa0ac2d2b3426bfa77111044d7cf10fabd4b5064c18c9585a48a69357e79
57fde49f8e19386de5c15f77028c331dc40190e2516480c1a7a390d5792fd819
8d7347806298137341eb8e29a6872c544f3ea9cc44170fae8205c5b1a449c9a1
ab2381beeb1512033aff970864e7157ac4ffbee9222c09a4c4c202a88223567d
bc70496dd7e640f272ffb8ee5cd382db1d86c97379e36c01ee730ae1848ce880
c8e118f2cb4c93e285a9abe8f2e4b8f564c4b0d461ced0d1bf897fcf950d5c67
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
e530461d69543bd6e8d2a5f0501506dc225b7d7ac2a5b0c7107b350637400971
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e