mail.t-mobile-eip.net
Open in
urlscan Pro
185.2.103.2
Malicious Activity!
Public Scan
Submission: On March 02 via api from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 2nd 2020. Valid for: 3 months.
This is the only time mail.t-mobile-eip.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telekom (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 185.2.103.2 185.2.103.2 | 51167 (CONTABO) (CONTABO) | |
6 | 208.54.116.197 208.54.116.197 | 21928 (T-MOBILE-...) (T-MOBILE-AS21928) | |
11 | 3 |
ASN51167 (CONTABO, DE)
PTR: server21.flaunt7.com
mail.t-mobile-eip.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
t-mobile.com
workspace35.t-mobile.com |
373 KB |
1 |
t-mobile-eip.net
mail.t-mobile-eip.net |
3 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
6 | workspace35.t-mobile.com |
mail.t-mobile-eip.net
|
1 | mail.t-mobile-eip.net | |
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
passwordreset.t-mobile.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
t-mobile-eip.net cPanel, Inc. Certification Authority |
2020-03-02 - 2020-05-31 |
3 months | crt.sh |
workspace35tt.euv01.t-mobile.com Entrust Certification Authority - L1K |
2019-11-07 - 2020-11-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://mail.t-mobile-eip.net/
Frame ID: 03EACEA41485E36860EAB89BD5C34DB7
Requests: 11 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Click here to reset your password.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
mail.t-mobile-eip.net/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rdx.css
workspace35.t-mobile.com/vpn/js/rdx/core/css/ |
397 KB 73 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base.css
workspace35.t-mobile.com/logon/themes/Default/css/ |
35 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
citrix-fonts.css
workspace35.t-mobile.com/logon/fonts/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
custom.css
workspace35.t-mobile.com/logon/themes/Default/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TMobile_Background_Web.jpg
workspace35.t-mobile.com/logon/themes/Default/custom_media/ |
115 KB 116 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header_gradient.png
workspace35.t-mobile.com/vpn/js/rdx/core/css/ |
139 KB 139 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
citrixsans_regular.woff
workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
citrixsans_semibold.woff
workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
citrixsans_regular.ttf
workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
citrixsans_semibold.ttf
workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- workspace35.t-mobile.com
- URL
- https://workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/citrixsans_regular.woff
- Domain
- workspace35.t-mobile.com
- URL
- https://workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/citrixsans_semibold.woff
- Domain
- workspace35.t-mobile.com
- URL
- https://workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/citrixsans_regular.ttf
- Domain
- workspace35.t-mobile.com
- URL
- https://workspace35.t-mobile.com/vpn/js/rdx/core/css/fonts/citrix_sans/citrixsans_semibold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telekom (Telecommunication)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| changePage function| setFocus0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.t-mobile-eip.net
workspace35.t-mobile.com
workspace35.t-mobile.com
185.2.103.2
208.54.116.197
13fc4b7a465f3458acaa898b644fca2092fc73ab128a166644ebe56f49debf2a
1e3ec2f8f39970fa0536478aa80d3b7986c3ec6b02ee0505ae3b90630e68fc52
7b51adf47adc3532084784cec21fc1a1e0d2f10a3dfd40b1c68c451830ccf98f
86e7d27908a1e8f073270209229f4f71d57020f7a3b38327665abcfa99681448
87124f6c3518887e888a669e4ae156f8da68d367f59821671d98ac2490f466f1
ee96581381cd6b5cafefb9f2d2cc77be78d7e769c9fcd7aa083468e43087ba93
f512b1c7b49a4d1af362ebd101a2051a6648a7a369a24c52534f38bbc63e1d83