mail.colsgate.com
Open in
urlscan Pro
162.222.225.91
Malicious Activity!
Public Scan
Submission: On November 20 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on November 10th 2022. Valid for: 3 months.
This is the only time mail.colsgate.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: LinkedIn (Social Network)Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 162.222.225.91 162.222.225.91 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
3 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: scom-dallas.webhostbox.net
mail.colsgate.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
colsgate.com
mail.colsgate.com |
37 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
3 | mail.colsgate.com |
mail.colsgate.com
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.colsgate.com R3 |
2022-11-10 - 2023-02-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mail.colsgate.com/2274trr6/LinkedIn2.0.6/cmd-login=bc955836ebda3b915ae2cc804f4046ba/root.php
Frame ID: 081D98D203910879C2E9C0174D6C7AC7
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
root.php
mail.colsgate.com/2274trr6/LinkedIn2.0.6/cmd-login=bc955836ebda3b915ae2cc804f4046ba/ |
41 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
mail.colsgate.com/2274trr6/LinkedIn2.0.6/cmd-login=bc955836ebda3b915ae2cc804f4046ba/includes/ |
28 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer.jpg
mail.colsgate.com/2274trr6/LinkedIn2.0.6/cmd-login=bc955836ebda3b915ae2cc804f4046ba/includes/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
November 21st 2022, 12:49:43 pm
UTC —
From United States
Threats:
Social Engineering
Brand Impersonation
Phishing
Brands:
LinkedIn
US
Comment: Phishing page to steal credentials from LinkedIn users
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: LinkedIn (Social Network)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mail.colsgate.com
162.222.225.91
3b631974aee80b76672d3bc06f0a510ddff66171ccd08204854e7c776c217bf1
c55ab98d6f0409b453625cb1e4550d5587cb06416f8947103293ebb4517d0833
ed91c63ec53a53f3af6c3b22c495ce6ba439486cc54fa753733efa831ad51fcf