passwordtest.itsecuremessages.com Open in urlscan Pro
13.236.53.50  Malicious Activity! Public Scan

URL: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/
Submission Tags: falconsandbox
Submission: On September 16 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 13.236.53.50, located in Sydney, Australia and belongs to AMAZON-02, US. The main domain is passwordtest.itsecuremessages.com.
This is the only time passwordtest.itsecuremessages.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Phishing Simulation (Internet)

Domain & IP information

IP Address AS Autonomous System
5 13.236.53.50 16509 (AMAZON-02)
5 1
Apex Domain
Subdomains
Transfer
5 itsecuremessages.com
passwordtest.itsecuremessages.com
197 KB
5 1
Domain Requested by
5 passwordtest.itsecuremessages.com passwordtest.itsecuremessages.com
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/
Frame ID: E6465EA4F9BB066BB6097E71857D9CFD
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

404 - Quick Tip | Cofense

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

197 kB
Transfer

195 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/
3 KB
4 KB
Document
General
Full URL
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
351fae9836bfd71f1400ae73590a88a085ec3ed6286184ffb81793c8f0c27a6d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Host
passwordtest.itsecuremessages.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Thu, 16 Sep 2021 12:10:16 GMT
Server
Apache
Cache-Control
no-store
Referrer-Policy
strict-origin-when-cross-origin
X-Permitted-Cross-Domain-Policies
none
Pragma
no-cache
X-XSS-Protection
1; mode=block
X-Request-Id
5a596995-d92b-429e-b178-38f8dd307447
X-Download-Options
noopen noopen
X-Runtime
0.034796
X-Frame-Options
DENY
X-Content-Type-Options
nosniff
Expires
Fri, 01 Jan 1990 00:00:00 GMT
Status
404 Not Found
Access-Control-Allow-Origin
http://landing.phishme.com.au
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
phishme_spear_phishing_quick_tip_title.png
passwordtest.itsecuremessages.com/images/www/
87 KB
87 KB
Image
General
Full URL
http://passwordtest.itsecuremessages.com/images/www/phishme_spear_phishing_quick_tip_title.png
Requested by
Host: passwordtest.itsecuremessages.com
URL: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
8079376a80d57cf462aad98f4d21542871852b4f4edc5fe3db2f2f1839fdc87d

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
passwordtest.itsecuremessages.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 16 Sep 2021 12:10:16 GMT
Last-Modified
Thu, 26 Aug 2021 18:23:52 GMT
Server
Apache
ETag
"15b42-5ca7a78057e00"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
88898
Expires
Thu, 16 Sep 2021 12:10:16 GMT
phishme_spear_phishing_quick_tip.png
passwordtest.itsecuremessages.com/images/www/
93 KB
93 KB
Image
General
Full URL
http://passwordtest.itsecuremessages.com/images/www/phishme_spear_phishing_quick_tip.png
Requested by
Host: passwordtest.itsecuremessages.com
URL: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
e106b2b8a45566462a60cecbe4e8f8c1ffb287e40222b1db28fc46e7da43766d

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
passwordtest.itsecuremessages.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 16 Sep 2021 12:10:16 GMT
Last-Modified
Thu, 26 Aug 2021 18:23:52 GMT
Server
Apache
ETag
"17261-5ca7a78057e00"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
94817
Expires
Thu, 16 Sep 2021 12:10:16 GMT
reporter.png
passwordtest.itsecuremessages.com/images/www/
12 KB
12 KB
Image
General
Full URL
http://passwordtest.itsecuremessages.com/images/www/reporter.png
Requested by
Host: passwordtest.itsecuremessages.com
URL: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
b66912ec278b45ce43a38e270d8f94f39296787dd3857274002951d7b773761a

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
passwordtest.itsecuremessages.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 16 Sep 2021 12:10:16 GMT
Last-Modified
Thu, 26 Aug 2021 18:23:52 GMT
Server
Apache
ETag
"3016-5ca7a78057e00"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
12310
Expires
Thu, 16 Sep 2021 12:10:16 GMT
Cofense_spear_phishing_quick_tip_ground.png
passwordtest.itsecuremessages.com/images/www/
0
654 B
Image
General
Full URL
http://passwordtest.itsecuremessages.com/images/www/Cofense_spear_phishing_quick_tip_ground.png
Requested by
Host: passwordtest.itsecuremessages.com
URL: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
passwordtest.itsecuremessages.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 16 Sep 2021 12:10:16 GMT
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Access-Control-Allow-Origin
http://landing.phishme.com.au
Status
404 Not Found
Connection
Keep-Alive
Content-Length
0
X-XSS-Protection
1; mode=block
X-Request-Id
1323a7ed-7de0-4a8c-aa21-309e54387975
X-Runtime
0.020946
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Download-Options
noopen noopen
X-Frame-Options
DENY
Content-Type
image/png
Pragma
no-cache
Cache-Control
no-store
Keep-Alive
timeout=5, max=100
Expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Phishing Simulation (Internet)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: http://passwordtest.itsecuremessages.com/da507f/141f0626-c1e0-4bb3-9e5c-88fc471dfe5f/?
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
network error URL: http://passwordtest.itsecuremessages.com/images/www/Cofense_spear_phishing_quick_tip_ground.png
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block