alnuaimi-group.com
Open in
urlscan Pro
162.144.126.144
Malicious Activity!
Public Scan
Effective URL: http://alnuaimi-group.com/mollmli5/
Submission: On October 10 via manual from SE — Scanned from SE
Summary
This is the only time alnuaimi-group.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Spotify (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 172.67.192.143 172.67.192.143 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 162.144.126.144 162.144.126.144 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
2 | 104.16.87.20 104.16.87.20 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: server.alnuaimi-group.com
alnuaimi-group.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 492 |
49 KB |
2 |
alnuaimi-group.com
alnuaimi-group.com |
316 KB |
1 |
travelmadnessexpo.com
cf.travelmadnessexpo.com |
587 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
2 | cdn.jsdelivr.net |
alnuaimi-group.com
|
2 | alnuaimi-group.com |
alnuaimi-group.com
|
1 | cf.travelmadnessexpo.com | |
5 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.travelmadnessexpo.com E1 |
2022-08-28 - 2022-11-26 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-02 - 2023-06-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://alnuaimi-group.com/mollmli5/
Frame ID: 59480AB3B5C5BF7C031A464E45246387
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Logga in - SpotifyPage URL History Show full URLs
- https://cf.travelmadnessexpo.com/cli/ Page URL
- http://alnuaimi-group.com/mollmli5/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://cf.travelmadnessexpo.com/cli/ Page URL
- http://alnuaimi-group.com/mollmli5/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
cf.travelmadnessexpo.com/cli/ |
141 B 587 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
alnuaimi-group.com/mollmli5/ |
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/ |
160 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/js/ |
76 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
alnuaimi-group.com/mollmli5/ |
311 KB 311 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
353 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
74 KB 74 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
68 KB 68 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
72 KB 72 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Spotify (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation number| uidEvent object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
alnuaimi-group.com
cdn.jsdelivr.net
cf.travelmadnessexpo.com
104.16.87.20
162.144.126.144
172.67.192.143
04d9f4f82df4840d6912e0272433f28529725688aa7edb92d909a0c82833eca7
372cd0fe98167ffc57b624aed00ab6f53e89bd8cf5690867c1a786983ceec95b
4500df588714853d601e62b03108a97536cb91a6ea3debaf368ddce956d8656f
62f74b1cf824a89f03554c638e719594c309b4d8a627a758928c0516fa7890ab
6384070e855e2ec15caefb6334ab2c4b1b9e798ce2e369cc00f0d47a41138e0d
8ee87ad04ab3c3188864033ea458bf1d31c6ddcfa8f7baff5d26c85651d13efb
d77456e48416e475066a580b2050cee4f86a3819556d0ddf90d81250f3af9de2
f5210fa3e7f0245a4c51eb7f280092c0ef99fdd28c45e17dab8cc5854fdf4fd3
f771fe217119432dbcdb59fe3d3ac37547eadd1a118d1646011d1d7ba7e053bf
fdf0e3938479eb6e108e7869436051b7072b9a18ecb98b3c6b49d1b29d8bc758