fours.serveftp.com
Open in
urlscan Pro
199.192.19.123
Malicious Activity!
Public Scan
Effective URL: http://fours.serveftp.com/t2vYrIfjJq89sEaA8HjcuTdjafys30q/5b8ff32c7fb63/cmViZWNhLnN1YXJlekBlbmJyaWRnZS5jb20=?forced=1&tg=Q...
Submission: On September 05 via manual from CA
Summary
This is the only time fours.serveftp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 199.192.19.123 199.192.19.123 | 22612 (NAMECHEAP...) (NAMECHEAP-NET - Namecheap) | |
5 | 52.216.130.147 52.216.130.147 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 | 2a00:1450:400... 2a00:1450:4001:81c::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:29f::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 54.152.208.69 54.152.208.69 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::681f:5d47 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
14 | 8 |
ASN22612 (NAMECHEAP-NET - Namecheap, Inc., US)
PTR: server2.dmp94.us
fours.serveftp.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
asgard-production.s3.amazonaws.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-152-208-69.compute-1.amazonaws.com
lap.richardquason.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
app.cloud55.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
amazonaws.com
asgard-production.s3.amazonaws.com |
61 KB |
3 |
gfx.ms
auth.gfx.ms |
294 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
2 |
serveftp.com
1 redirects
fours.serveftp.com |
11 KB |
1 |
cloud55.org
app.cloud55.org |
|
1 |
gstatic.com
fonts.gstatic.com |
11 KB |
1 |
richardquason.com
lap.richardquason.com |
23 KB |
14 | 7 |
Domain | Requested by | |
---|---|---|
5 | asgard-production.s3.amazonaws.com |
fours.serveftp.com
|
3 | auth.gfx.ms |
fours.serveftp.com
|
2 | fonts.googleapis.com |
fours.serveftp.com
|
2 | fours.serveftp.com | 1 redirects |
1 | app.cloud55.org |
asgard-production.s3.amazonaws.com
|
1 | fonts.gstatic.com |
fours.serveftp.com
|
1 | lap.richardquason.com |
asgard-production.s3.amazonaws.com
|
14 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.amazonaws.com DigiCert Baltimore CA-2 G2 |
2017-09-22 - 2019-01-03 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2018-08-14 - 2018-10-23 |
2 months | crt.sh |
msagfx.live.com Microsoft IT TLS CA 4 |
2017-07-27 - 2019-07-17 |
2 years | crt.sh |
lap.richardquason.com COMODO RSA Domain Validation Secure Server CA |
2018-08-13 - 2019-08-13 |
a year | crt.sh |
*.google.com Google Internet Authority G3 |
2018-08-14 - 2018-10-23 |
2 months | crt.sh |
sni61967.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-08-21 - 2019-02-27 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://fours.serveftp.com/t2vYrIfjJq89sEaA8HjcuTdjafys30q/5b8ff32c7fb63/cmViZWNhLnN1YXJlekBlbmJyaWRnZS5jb20=?forced=1&tg=QWNjb3VudHBheWFibGU=&s=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
Frame ID: 60D24C77CC52DC7244E9B274252A3EF2
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://fours.serveftp.com/efz37f4for
HTTP 302
http://fours.serveftp.com/t2vYrIfjJq89sEaA8HjcuTdjafys30q/5b8ff32c7fb63/cmViZWNhLnN1YXJlekBlbmJyaWRnZS... Page URL
Detected technologies
ZURB Foundation (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+foundation[^>"]+css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Forgot Password
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://fours.serveftp.com/efz37f4for
HTTP 302
http://fours.serveftp.com/t2vYrIfjJq89sEaA8HjcuTdjafys30q/5b8ff32c7fb63/cmViZWNhLnN1YXJlekBlbmJyaWRnZS5jb20=?forced=1&tg=QWNjb3VudHBheWFibGU=&s=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 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
cmViZWNhLnN1YXJlekBlbmJyaWRnZS5jb20=
fours.serveftp.com/t2vYrIfjJq89sEaA8HjcuTdjafys30q/5b8ff32c7fb63/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
normalize.css
asgard-production.s3.amazonaws.com/robot-108.getforge.io/1534278979/general/ |
8 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
foundation.css
asgard-production.s3.amazonaws.com/robot-108.getforge.io/1534278979/general/ |
183 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
asgard-production.s3.amazonaws.com/robot-108.getforge.io/1534278979/outlook/ |
243 B 654 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
2 KB 609 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
776 B 493 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
asgard-production.s3.amazonaws.com/robot-108.getforge.io/1534278979/general/ |
83 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uiexchange.js
asgard-production.s3.amazonaws.com/robot-108.getforge.io/1534278979/general/ |
13 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
auth.gfx.ms/16.000.27486.00/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account_msa.svg
auth.gfx.ms/16.000.27486.00/images/ |
379 B 656 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eyJpdiI6IkV2YnZvcUlJOTdmVzZuRFp2YXFmUWc9PSIsInZhbHVlIjoiS0JwZW5uRHluM252TlppV3lwZDBTaWRSU3JVXC81S1wvVGVwYVRBSm56ZXR6TzdZRnpRWkhzcHk4M1NrUVVqcDZnb05JKzRIOHlvQVArK21KSHA5SXUzVU9OUnZndjFTdmduc1BJTm1ob...
lap.richardquason.com/an/ |
23 KB 23 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.27486.00/images/Backgrounds/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
KFOlCnqEu92Fr1MmSU5fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v18/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rebeca.suarez@enbridge.com
app.cloud55.org/ping/view/4683/ |
1 B 0 |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| CryptoJS undefined| jQuery21105290893653830668_15361759101941 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
fours.serveftp.com/ | Name: laravel_session Value: eyJpdiI6ImpwbHhrNUtjek9lNGlLT2J4d3JcL2dnPT0iLCJ2YWx1ZSI6ImxhSXB6T0xSdFI4RmtRdkxlblc5dU5lQ3RSalpZVFJPenA2YmZSc1Z2WjI4engzNGdvS2lBYWhjaWVDUlI4bXp1WUNBMng1bmxTeExVYnVwTXlHdDB3PT0iLCJtYWMiOiIwMDljMmNhZmIwYTBiNjIzZjk4MjAyYzVjZDI3MmYyYTUyZTI0NDk0Y2E2MzA4NzJkNmIyYWQ3NWMxZDYwZDZlIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app.cloud55.org
asgard-production.s3.amazonaws.com
auth.gfx.ms
fonts.googleapis.com
fonts.gstatic.com
fours.serveftp.com
lap.richardquason.com
199.192.19.123
2400:cb00:2048:1::681f:5d47
2a00:1450:4001:819::2003
2a00:1450:4001:81c::200a
2a02:26f0:6c00:283::34ef
2a02:26f0:6c00:29f::34ef
52.216.130.147
54.152.208.69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