securemail.bigbarbell.com Open in urlscan Pro
107.178.105.19  Malicious Activity! Public Scan

URL: http://securemail.bigbarbell.com/viewer/pdfx/
Submission: On September 05 via api from TW

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 107.178.105.19, located in Phoenix, United States and belongs to IOFLOOD, US. The main domain is securemail.bigbarbell.com.
This is the only time securemail.bigbarbell.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 5 107.178.105.19 53755 (IOFLOOD)
4 1
Apex Domain
Subdomains
Transfer
5 bigbarbell.com
securemail.bigbarbell.com
301 KB
4 1
Domain Requested by
5 securemail.bigbarbell.com 1 redirects securemail.bigbarbell.com
4 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://securemail.bigbarbell.com/viewer/pdfx/
Frame ID: 425682DFE1B9F1B9DC1509369821C782
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://securemail.bigbarbell.com/viewer/pdfx HTTP 301
    http://securemail.bigbarbell.com/viewer/pdfx/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

301 kB
Transfer

300 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://securemail.bigbarbell.com/viewer/pdfx HTTP 301
    http://securemail.bigbarbell.com/viewer/pdfx/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
securemail.bigbarbell.com/viewer/pdfx/
Redirect Chain
  • http://securemail.bigbarbell.com/viewer/pdfx
  • http://securemail.bigbarbell.com/viewer/pdfx/
2 KB
2 KB
Document
General
Full URL
http://securemail.bigbarbell.com/viewer/pdfx/
Protocol
HTTP/1.1
Server
107.178.105.19 Phoenix, United States, ASN53755 (IOFLOOD, US),
Reverse DNS
padma.whitelabelwebserver.com
Software
Apache /
Resource Hash
983672e9a07b065076f3ed64b65fba2f732f9d8195d20f904931e52872b527fd

Request headers

Host
securemail.bigbarbell.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 05 Sep 2020 13:40:54 GMT
Server
Apache
Last-Modified
Mon, 13 Jan 2020 16:42:28 GMT
Accept-Ranges
bytes
Content-Length
1926
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html

Redirect headers

Date
Sat, 05 Sep 2020 13:40:54 GMT
Server
Apache
Location
http://securemail.bigbarbell.com/viewer/pdfx/
Content-Length
253
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
splash.png
securemail.bigbarbell.com/viewer/pdfx/Sign%20in_files/
30 KB
30 KB
Image
General
Full URL
http://securemail.bigbarbell.com/viewer/pdfx/Sign%20in_files/splash.png
Requested by
Host: securemail.bigbarbell.com
URL: http://securemail.bigbarbell.com/viewer/pdfx/
Protocol
HTTP/1.1
Server
107.178.105.19 Phoenix, United States, ASN53755 (IOFLOOD, US),
Reverse DNS
padma.whitelabelwebserver.com
Software
Apache /
Resource Hash
465f6e01fd42063b328b216696de29a5c57136c9d23ed349841b8f1401e82ff4

Request headers

Referer
http://securemail.bigbarbell.com/viewer/pdfx/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 05 Sep 2020 13:40:55 GMT
Last-Modified
Mon, 16 Dec 2019 04:28:09 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
30369
newenter.png
securemail.bigbarbell.com/viewer/pdfx/Sign%20in_files/
3 KB
4 KB
Image
General
Full URL
http://securemail.bigbarbell.com/viewer/pdfx/Sign%20in_files/newenter.png
Requested by
Host: securemail.bigbarbell.com
URL: http://securemail.bigbarbell.com/viewer/pdfx/
Protocol
HTTP/1.1
Server
107.178.105.19 Phoenix, United States, ASN53755 (IOFLOOD, US),
Reverse DNS
padma.whitelabelwebserver.com
Software
Apache /
Resource Hash
d680e90616fe9a7748c10a222d4fd38e25034db17a230267fde1d7c3b13e9ad9

Request headers

Referer
http://securemail.bigbarbell.com/viewer/pdfx/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 05 Sep 2020 13:40:55 GMT
Last-Modified
Mon, 16 Dec 2019 04:54:50 GMT
Server
Apache
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=5, max=100
Content-Length
3545
background.png
securemail.bigbarbell.com/viewer/pdfx/Sign%20in_files/
265 KB
265 KB
Image
General
Full URL
http://securemail.bigbarbell.com/viewer/pdfx/Sign%20in_files/background.png
Requested by
Host: securemail.bigbarbell.com
URL: http://securemail.bigbarbell.com/viewer/pdfx/
Protocol
HTTP/1.1
Server
107.178.105.19 Phoenix, United States, ASN53755 (IOFLOOD, US),
Reverse DNS
padma.whitelabelwebserver.com
Software
Apache /
Resource Hash
ddb6b5706f83f5a11d4de018b5b1d40164ee2703f95e4ed6ba93a656f6b17edd

Request headers

Referer
http://securemail.bigbarbell.com/viewer/pdfx/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 05 Sep 2020 13:40:55 GMT
Last-Modified
Mon, 16 Dec 2019 06:09:31 GMT
Server
Apache
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=5, max=100
Content-Length
271219

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| unhideBody

0 Cookies