www.outlook-mailer.com Open in urlscan Pro
54.194.219.177  Malicious Activity! Public Scan

URL: https://www.outlook-mailer.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjU4N2JiZTYxLTgyZjUtNDg5Yy1hYzE3LTE1MGQ3ZT...
Submission Tags: @jcybersec_
Submission: On May 27 via api from GB

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 54.194.219.177, located in Dublin, Ireland and belongs to AMAZON-02, US. The main domain is www.outlook-mailer.com.
TLS certificate: Issued by Amazon on April 17th 2020. Valid for: a year.
This is the only time www.outlook-mailer.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 54.194.219.177 16509 (AMAZON-02)
1 2
Apex Domain
Subdomains
Transfer
1 outlook-mailer.com
www.outlook-mailer.com
224 KB
1 1
Domain Requested by
1 www.outlook-mailer.com
1 1

This site contains no links.

Subject Issuer Validity Valid
outlook-mailer.com
Amazon
2020-04-17 -
2021-05-17
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.outlook-mailer.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjU4N2JiZTYxLTgyZjUtNDg5Yy1hYzE3LTE1MGQ3ZTI3MmU1NyIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiOGI4MjY2ZGQtMmY5Yi00NTIyLWJiYzAtYTI3Yzc1ZWI0MWZiIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkwMjU2MTI4LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTgwMzIxMjh9.g_-t20-l1OLrmWvMTe7pD8-hMR8TMjZlc7DJZgWv2hU
Frame ID: C65A35D8C4F938A76E3CD29F5CDA3DE1
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

224 kB
Transfer

526 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin
www.outlook-mailer.com/
308 KB
224 KB
Document
General
Full URL
https://www.outlook-mailer.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjU4N2JiZTYxLTgyZjUtNDg5Yy1hYzE3LTE1MGQ3ZTI3MmU1NyIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiOGI4MjY2ZGQtMmY5Yi00NTIyLWJiYzAtYTI3Yzc1ZWI0MWZiIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkwMjU2MTI4LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTgwMzIxMjh9.g_-t20-l1OLrmWvMTe7pD8-hMR8TMjZlc7DJZgWv2hU
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.219.177 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-194-219-177.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
08bac86ace14db3e1a2327a77c0137dc5fc4176c275b4e327fe464e025ee60b4

Request headers

Host
www.outlook-mailer.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 27 May 2020 02:29:06 GMT
Content-Type
text/html; charset=utf-8
Content-Length
228884
Connection
keep-alive
Server
nginx/1.16.1
Content-Encoding
gzip
X-rq
lhr1 102 123 3122
Cache-Control
max-age=300, must-revalidate
Age
1121
X-Cache
hit
Vary
Accept-Encoding
Accept-Ranges
bytes
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5f26fbb75543707214d0ac8393ff373d747c7d2284962460a9f56a94ce90ea1b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
407 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
25dcb076abff6660e390fb9eddd59dc91312b52d76997d4a3c013662d5e7babd

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
213 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5d9e119f009cbf72908a183f3339ecafe4aa70c49aef844736748e08abb65aa2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies