genixtec.com
Open in
urlscan Pro
50.87.150.200
Malicious Activity!
Public Scan
Effective URL: https://genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/?Key=82764419637&rand=13InboxLightaspxn.8276441963...
Submission: On September 30 via api from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on September 12th 2019. Valid for: a year.
This is the only time genixtec.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 162.144.55.189 162.144.55.189 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
2 8 | 50.87.150.200 50.87.150.200 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
1 | 2a00:1450:400... 2a00:1450:4001:818::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
9 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: server.ill.lsr.mybluehost.me
prettybossexclusive.com |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 50-87-150-200.unifiedlayer.com
genixtec.com |
ASN15169 (GOOGLE - Google LLC, US)
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
genixtec.com
2 redirects
genixtec.com |
38 KB |
2 |
gfx.ms
auth.gfx.ms |
418 B |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
prettybossexclusive.com
1 redirects
prettybossexclusive.com |
649 B |
9 | 4 |
Domain | Requested by | |
---|---|---|
8 | genixtec.com |
2 redirects
genixtec.com
|
2 | auth.gfx.ms |
genixtec.com
|
1 | ajax.googleapis.com |
genixtec.com
|
1 | prettybossexclusive.com | 1 redirects |
9 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
login.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
genixtec.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-12 - 2020-09-11 |
a year | crt.sh |
*.googleapis.com GTS CA 1O1 |
2019-09-05 - 2019-11-28 |
3 months | crt.sh |
msagfx.live.com Microsoft IT TLS CA 2 |
2019-06-13 - 2021-06-13 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/?Key=82764419637&rand=13InboxLightaspxn.827644196371774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn..1774256418&fid.1252899642&fid.1&fav.1&login=bmFkaWEubS5yb3VtYW5vc0B2YW5kZXJiaWx0LmVkdQ==&.rand=13InboxLight.aspx?n=827644196371774256418&fid=4
Frame ID: 1BA75996DCED91CABA5EAF6ADF8B2D51
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://prettybossexclusive.com/wp-includes/js/tinymce/1%4028!7/index.php?loge=nadia.m.roumanos@vanderbilt.e...
HTTP 302
https://genixtec.com/6718291/auto/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fi... HTTP 302
https://genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807?Key=82764419637&rand=13InboxLi... HTTP 301
https://genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/?Key=82764419637&rand=13InboxL... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Forgot my password
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://prettybossexclusive.com/wp-includes/js/tinymce/1%4028!7/index.php?loge=nadia.m.roumanos@vanderbilt.edu&kjhgdhj=Vanderbilt.edu&sdfg=iuyu
HTTP 302
https://genixtec.com/6718291/auto/index.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&loge=nadia.m.roumanos@vanderbilt.edu&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP 302
https://genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807?Key=82764419637&rand=13InboxLightaspxn.827644196371774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn..1774256418&fid.1252899642&fid.1&fav.1&login=bmFkaWEubS5yb3VtYW5vc0B2YW5kZXJiaWx0LmVkdQ==&.rand=13InboxLight.aspx?n=827644196371774256418&fid=4 HTTP 301
https://genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/?Key=82764419637&rand=13InboxLightaspxn.827644196371774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn..1774256418&fid.1252899642&fid.1&fav.1&login=bmFkaWEubS5yb3VtYW5vc0B2YW5kZXJiaWx0LmVkdQ==&.rand=13InboxLight.aspx?n=827644196371774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/ Redirect Chain
|
16 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged_v21033.css
genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/inc/ |
92 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/inc/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left.svg
genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/inc/ |
513 B 606 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white.svg
genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/inc/ |
915 B 945 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey.svg
genixtec.com/6718291/auto/8e3fc2dcfb162ca45aba868b9dba6807/inc/ |
915 B 945 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
auth.gfx.ms/16.000.27773.2/images/Backgrounds/ |
0 209 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.27773.2/images/Backgrounds/ |
0 209 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)47 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery number| f76ca8 function| lI1 function| c8qaYuL0583t262F2M undefined| l1l undefined| ll1 undefined| lll string| l_ll string| l11 number| lII string| zLP object| rRWhe object| otV5f string| t18D9z6U0 string| wgEH3 string| m84JYf7Qd1n3 string| e6zqUdxZX18yBK string| y6X14j1q766 string| gSmsoT4 function| t262F2Mc8qaYuL0583 string| oPfG3NIy function| gA702Gtr string| rt3PcVq string| rGeStnn number| ii object| l5 string| l6 number| ll number| _l string| msg function| nem function| check undefined| dl number| oe undefined| da function| ge boolean| ws string| tN boolean| izN undefined| zis undefined| zis8 boolean| zOF boolean| i7f string| i83w380p32kS8b0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
auth.gfx.ms
genixtec.com
prettybossexclusive.com
162.144.55.189
2a00:1450:4001:818::200a
2a02:26f0:6c00:283::34ef
50.87.150.200
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
4e9e7c1c2df9e91cf271a7afe529360d199cdff23a721473062ee1ebabd6821f
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
c9ecad6bbcdab116089531157de72e878986911f9419dd641126cd12c3d3fd29
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855