curioustek.com
Open in
urlscan Pro
116.12.52.40
Malicious Activity!
Public Scan
Submission: On November 16 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 27th 2022. Valid for: 3 months.
This is the only time curioustek.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 116.12.52.40 116.12.52.40 | 38532 (EXABYTES-...) (EXABYTES-AS-AP Exabytes Network Singapore Pte. Ltd.) | |
9 | 1 |
ASN38532 (EXABYTES-AS-AP Exabytes Network Singapore Pte. Ltd., SG)
PTR: server.hengrichcapital.com
curioustek.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
curioustek.com
curioustek.com |
233 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | curioustek.com |
curioustek.com
|
9 | 1 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
curioustek.com cPanel, Inc. Certification Authority |
2022-10-27 - 2023-01-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://curioustek.com/ShareFiless/SharePointOnline.html
Frame ID: D7D742F4137EB8EBFFE56148EF02BCBE
Requests: 9 HTTP requests in this frame
6 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
SharePointOnline.html
curioustek.com/ShareFiless/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
curioustek.com/ShareFiless/SharePointOnline_files/ |
84 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bckg.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
72 KB 72 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ge.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tlk.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ayl.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yhs.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tfe.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ther.png
curioustek.com/ShareFiless/SharePointOnline_files/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| basicPopup function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
curioustek.com
116.12.52.40
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
26ee662f01c59f29db0f73ad9d5e8450b37ec2f0449b28f45b9bcdedc74c900a
3c9065c253123764592e817a61f33c4e1dd3c63cbf9e497f71b23429dfd6919c
3d2219c375350544bcf9c3eaf4cd1292fec9dbd7ade17ce7e9ba02de170b10fa
5f2714b8642421a8c9ab04aff7a9660297f57662e1bf4eef21ea1ce64addb691
7db84bd884a0fdb669aebd4e2e7e3ff0012cc55867ed7fe06fe0e4f9e89fa0c2
8f5c66ecb9f1969437d351ea275d9c452ca75d5777be77923b37bf4ebd6a5b36
9e267bd431eaae748e3aae26ada2644eae9ead2bee3080ed10efbbc5f2a9e968
bc5242de0c2098df15d4c39b6a1ab87e7ecab1973f40ea9e9d387892292c4608