login.mailboxadmin.com.au Open in urlscan Pro
3.121.154.182  Malicious Activity! Public Scan

URL: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/
Submission: On February 16 via manual from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 3.121.154.182, located in Frankfurt am Main, Germany and belongs to AMAZON-02, US. The main domain is login.mailboxadmin.com.au.
TLS certificate: Issued by R3 on January 15th 2022. Valid for: 3 months.
This is the only time login.mailboxadmin.com.au was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Phishing Simulation (Internet)

Domain & IP information

IP Address AS Autonomous System
5 3.121.154.182 16509 (AMAZON-02)
5 1
Apex Domain
Subdomains
Transfer
5 mailboxadmin.com.au
login.mailboxadmin.com.au
197 KB
5 1
Domain Requested by
5 login.mailboxadmin.com.au login.mailboxadmin.com.au
5 1

This site contains no links.

Subject Issuer Validity Valid
*.mailboxadmin.com.au
R3
2022-01-15 -
2022-04-15
3 months crt.sh

This page contains 1 frames:

Primary Page: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/
Frame ID: 02AC334A04E8ADD2482D48D8546EEABE
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

404 - Quick Tip | Cofense

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

197 kB
Transfer

195 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/
3 KB
4 KB
Document
General
Full URL
https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.154.182 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-154-182.eu-central-1.compute.amazonaws.com
Software
Apache /
Resource Hash
351fae9836bfd71f1400ae73590a88a085ec3ed6286184ffb81793c8f0c27a6d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Access-Control-Allow-Origin
http://landing.phishme.co.uk
Cache-Control
no-store
Content-Type
text/html; charset=utf-8
Date
Wed, 16 Feb 2022 17:35:54 GMT
Expires
Fri, 01 Jan 1990 00:00:00 GMT
Pragma
no-cache
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
Status
404 Not Found
X-Content-Type-Options
nosniff
X-Download-Options
noopen noopen
X-Frame-Options
DENY
X-Permitted-Cross-Domain-Policies
none
X-Request-Id
abc5f0c5-1982-4655-800d-ddad0f654230
X-Runtime
0.022075
X-XSS-Protection
1; mode=block
Content-Length
3318
phishme_spear_phishing_quick_tip_title.png
login.mailboxadmin.com.au/images/www/
87 KB
87 KB
Image
General
Full URL
https://login.mailboxadmin.com.au/images/www/phishme_spear_phishing_quick_tip_title.png
Requested by
Host: login.mailboxadmin.com.au
URL: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.154.182 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-154-182.eu-central-1.compute.amazonaws.com
Software
Apache /
Resource Hash
8079376a80d57cf462aad98f4d21542871852b4f4edc5fe3db2f2f1839fdc87d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Wed, 16 Feb 2022 17:35:54 GMT
Last-Modified
Tue, 11 Jan 2022 19:24:14 GMT
Server
Apache
ETag
"15b42-5d55366029380"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.co.uk
Cache-Control
max-age=0
Accept-Ranges
bytes
Content-Length
88898
Expires
Wed, 16 Feb 2022 17:35:54 GMT
phishme_spear_phishing_quick_tip.png
login.mailboxadmin.com.au/images/www/
93 KB
93 KB
Image
General
Full URL
https://login.mailboxadmin.com.au/images/www/phishme_spear_phishing_quick_tip.png
Requested by
Host: login.mailboxadmin.com.au
URL: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.154.182 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-154-182.eu-central-1.compute.amazonaws.com
Software
Apache /
Resource Hash
e106b2b8a45566462a60cecbe4e8f8c1ffb287e40222b1db28fc46e7da43766d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Wed, 16 Feb 2022 17:35:54 GMT
Last-Modified
Tue, 11 Jan 2022 19:24:14 GMT
Server
Apache
ETag
"17261-5d55366029380"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.co.uk
Cache-Control
max-age=0
Accept-Ranges
bytes
Content-Length
94817
Expires
Wed, 16 Feb 2022 17:35:54 GMT
reporter.png
login.mailboxadmin.com.au/images/www/
12 KB
12 KB
Image
General
Full URL
https://login.mailboxadmin.com.au/images/www/reporter.png
Requested by
Host: login.mailboxadmin.com.au
URL: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.154.182 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-154-182.eu-central-1.compute.amazonaws.com
Software
Apache /
Resource Hash
b66912ec278b45ce43a38e270d8f94f39296787dd3857274002951d7b773761a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Wed, 16 Feb 2022 17:35:54 GMT
Last-Modified
Tue, 11 Jan 2022 19:24:14 GMT
Server
Apache
ETag
"3016-5d55366029380"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.co.uk
Cache-Control
max-age=0
Accept-Ranges
bytes
Content-Length
12310
Expires
Wed, 16 Feb 2022 17:35:54 GMT
Cofense_spear_phishing_quick_tip_ground.png
login.mailboxadmin.com.au/images/www/
0
597 B
Image
General
Full URL
https://login.mailboxadmin.com.au/images/www/Cofense_spear_phishing_quick_tip_ground.png
Requested by
Host: login.mailboxadmin.com.au
URL: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.154.182 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-154-182.eu-central-1.compute.amazonaws.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Wed, 16 Feb 2022 17:35:54 GMT
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Access-Control-Allow-Origin
http://landing.phishme.co.uk
Status
404 Not Found
Content-Length
0
X-XSS-Protection
1; mode=block
X-Request-Id
84dca694-0c21-44f1-84fa-83ff537e38ef
X-Runtime
0.018006
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Download-Options
noopen, noopen
X-Frame-Options
DENY
Content-Type
image/png
Pragma
no-cache
Cache-Control
no-store
Expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Phishing Simulation (Internet)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: https://login.mailboxadmin.com.au/26f13b/4d99393c-4c4b-466b-94a5-20c16f4bfe51/?
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
network error URL: https://login.mailboxadmin.com.au/images/www/Cofense_spear_phishing_quick_tip_ground.png
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block