blluetekgroup.com
Open in
urlscan Pro
202.38.172.223
Malicious Activity!
Public Scan
Effective URL: https://blluetekgroup.com/blog/dropbox/login.live.com/accts.php?login.srf?wa=wsignin1.0&rpsnv=12&ct=1425083828&rver=6.4.64...
Submission: On September 08 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 13th 2017. Valid for: 3 months.
This is the only time blluetekgroup.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook (Online) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 202.38.172.223 202.38.172.223 | 56202 (RIA-INFOS...) (RIA-INFOSOLUTIONS-IN Suite no 10) | |
17 | 1 |
ASN56202 (RIA-INFOSOLUTIONS-IN Suite no 10, Level 5; C Wing, IN)
blluetekgroup.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
blluetekgroup.com
blluetekgroup.com |
109 KB |
17 | 1 |
Domain | Requested by | |
---|---|---|
17 | blluetekgroup.com |
blluetekgroup.com
|
17 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
blluetekgroup.com cPanel, Inc. Certification Authority |
2017-07-13 - 2017-10-11 |
3 months | crt.sh |
This page contains 3 frames:
Primary Page:
https://blluetekgroup.com/blog/dropbox/login.live.com/accts.php?login.srf?wa=wsignin1.0&rpsnv=12&ct=1425083828&rver=6.4.6456.0&wp=MBI_SSL_SHARED&wreply=httpsbay169.mail.live.com%default.aspxFrru3inbox&lc=1033&id=64855&mkt=en-us&cbcxt=mai&email=
Frame ID: 20830.1
Requests: 3 HTTP requests in this frame
Frame:
https://blluetekgroup.com/blog/dropbox/login.live.com/hellion/EN-US(1).htm
Frame ID: 20830.2
Requests: 11 HTTP requests in this frame
Frame:
https://blluetekgroup.com/blog/dropbox/login.live.com/hellion/EN-US.htm
Frame ID: 20830.3
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
accts.php
blluetekgroup.com/blog/dropbox/login.live.com/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
R3WinLive1033.css
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ |
25 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EN-US(1).htm
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EN-US.htm
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
627 B 627 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
controls.png
blluetekgroup.com/blog/dropbox/login.live.com/hellion/hig/img/ |
8 KB 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mbox.js
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
event
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Outlook_SISU%20Refresh_Categories.jpg
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
63 KB 63 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style_win8.css
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-coretag.js
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
standard
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.css
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_mail.png
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
event
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bk-coretag.js
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
standard
blluetekgroup.com/blog/dropbox/login.live.com/hellion/ Frame 2083 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook (Online) Generic (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
blluetekgroup.com
202.38.172.223
01306728c439cfeb7dc188c44b6df68616c7d26a3813dd2de2d11bf3fede2663
1201c9e70331fab3bfeaae83d453b392f35eeccc008f0674c30b74492e9b1fa0
1d2216be7e7f5ec07ae65fc21adc3b3e6011cc0c494df1a972f4d16735478f4d
320013aa2c1dde9714565e2d05b52a9d012427bf8d359f172aae4b27820e110a
367ace28051f7526fa8f8015fe5df37b31e8d68951114f1baf41f85b7bd3d21a
6b1af85883b2ab64690488468bf9fb0699b82e0b8c3239129847e726bcd79c1b
beeb8672e0f8f04e8afd9814718f6d61ae2ebffb41dd573ed37b181f63e87440
d54419ea535786304292eab15c8cd83dd727045e52c05c76324f9ddbfc0f9b2c
f90a5583d32bfb95b3667da7d6e4e2192b482a99a49f11f612fb18a8dcb0d629