splitpointhr.com
Open in
urlscan Pro
192.185.171.241
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On July 12 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R11 on June 17th 2024. Valid for: 3 months.
This is the only time splitpointhr.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 192.185.171.241 192.185.171.241 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 | 193.137.9.143 193.137.9.143 | 1930 (RCCN Fund...) (RCCN Fundacao para a Ciencia e a Tecnologia) | |
3 | 3 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 192-185-171-241.unifiedlayer.com
splitpointhr.com |
ASN1930 (RCCN Fundacao para a Ciencia e a Tecnologia, I.P., PT)
PTR: mail.uminho.pt
mail.uminho.pt |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
splitpointhr.com
splitpointhr.com |
56 KB |
1 |
uminho.pt
mail.uminho.pt |
183 B |
3 | 2 |
Domain | Requested by | |
---|---|---|
2 | splitpointhr.com |
splitpointhr.com
|
1 | mail.uminho.pt | |
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
splitpointhr.com R11 |
2024-06-17 - 2024-09-15 |
3 months | crt.sh |
*.uminho.pt GEANT OV RSA CA 4 |
2024-06-07 - 2025-06-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://splitpointhr.com/umminnho/uminho.html
Frame ID: 58D08AA57DB520F7174E2708A17B30AE
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
uminho.html
splitpointhr.com/umminnho/ |
94 KB 56 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
32 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
segoeui-regular.ttf
splitpointhr.com/owa/auth/15.1.2242/themes/resources/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
mail.uminho.pt/owa/auth/15.1.2242/themes/resources/ |
0 183 B |
Other
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)26 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| initLogon function| redir function| shw function| hd function| clkSecExp function| kdSecExp function| clkSec function| clkBsc function| checkSubmit function| clkLgn function| clkRtry function| clkReLgn function| gbid function| IsOwaPremiumBrowser function| hres function| LogoffMime function| addPerfMarker number| a_fRC number| g_fFcs function| IsMimeCtlInst function| RndMimeCtl function| RndMimeCtlHlpr object| mainLogonDiv string| mainLogonDivClassName function| setPlaceholderText function| showPasswordClick1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
splitpointhr.com/umminnho | Name: cookieTest Value: 1 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.uminho.pt
splitpointhr.com
192.185.171.241
193.137.9.143
2d8c1b4cd688c685c2eb62e6643c11babc2f400f4421395acb801ce14dc3dc8e
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a
7e01f395bc5b70193c8c1dabf841b8553ca11bad3fd608872bafe397f9bd4537
c438e32fa8234d6d21172f33969906d759da770155e4cb9c5c2cd3067d8a2c94
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e4a9e9d0c8a2d4e34d78d870858c1b8a6fa8426b4b4381f34290244c78aa4749