strongencryption.org
Open in
urlscan Pro
54.88.249.60
Malicious Activity!
Public Scan
Effective URL: https://strongencryption.org/pages/116e4ddc343f/XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3R...
Submission: On February 20 via api from CH
Summary
TLS certificate: Issued by Amazon on November 26th 2018. Valid for: a year.
This is the only time strongencryption.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Phishing Simulation (Internet)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 54.210.16.126 54.210.16.126 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
8 | 54.88.249.60 54.88.249.60 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 139.51.11.173 139.51.11.173 | 14017 (BNSF-AS) (BNSF-AS - Burlington Northern Sante Fe Railway Corp) | |
10 | 3 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-210-16-126.compute-1.amazonaws.com
spamchallenge.msftemail.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-88-249-60.compute-1.amazonaws.com
strongencryption.org |
ASN14017 (BNSF-AS - Burlington Northern Sante Fe Railway Corp, US)
PTR: livewellbnsf.com
www.bnsf.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
strongencryption.org
strongencryption.org |
876 KB |
1 |
bnsf.com
www.bnsf.com |
15 KB |
1 |
msftemail.com
spamchallenge.msftemail.com |
744 B |
10 | 3 |
Domain | Requested by | |
---|---|---|
8 | strongencryption.org |
spamchallenge.msftemail.com
strongencryption.org |
1 | www.bnsf.com |
strongencryption.org
|
1 | spamchallenge.msftemail.com | |
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
strongencryption.org Amazon |
2018-11-26 - 2019-12-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://strongencryption.org/pages/116e4ddc343f/XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vc3Ryb25nZW5jcnlwdGlvbi5vcmcvcGFnZXMvMTE2ZTRkZGMzNDNm
Frame ID: 9D6AF6FF97B742CD521F16CD544C6879
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://spamchallenge.msftemail.com/XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3... Page URL
- https://strongencryption.org/pages/116e4ddc343f/XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5f... Page URL
Detected technologies
Modernizr (JavaScript Libraries) ExpandDetected patterns
- script /modernizr(?:-([\d.]*[\d]))?.*\.js/i
- env /^Modernizr$/i
Moment.js (JavaScript Libraries) Expand
Detected patterns
- env /^moment$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://spamchallenge.msftemail.com/XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vc3Ryb25nZW5jcnlwdGlvbi5vcmcvcGFnZXMvMTE2ZTRkZGMzNDNm Page URL
- https://strongencryption.org/pages/116e4ddc343f/XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vc3Ryb25nZW5jcnlwdGlvbi5vcmcvcGFnZXMvMTE2ZTRkZGMzNDNm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vc3Ryb25nZW5jcnlwdGlvbi5vcmcvcGFnZXMvMTE2ZTRkZGMzNDNm
spamchallenge.msftemail.com/ |
341 B 744 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
XcmVRjaXBpZWq50X2lkPTJQyNjc5btNjY1wNiZjYW1wJYWOlnbl9ydW5faWQ9MTgxXNjYyOCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vc3Ryb25nZW5jcnlwdGlvbi5vcmcvcGFnZXMvMTE2ZTRkZGMzNDNm
strongencryption.org/pages/116e4ddc343f/ |
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
application-c0f75ab45498817ae46f88f27c3d8ad1dd22efbbf9d34a0dbe3919ee889836bd.js
strongencryption.org/assets/ |
3 MB 846 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97.js
strongencryption.org/assets/ |
50 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-watermark-46ea054482a4c24d938b4b38a7697c9dbf537b919f1bb91ebbc3431cfbdbb376.css
strongencryption.org/assets/ |
1 KB 559 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-modal-0f75c20db4f00e133dab93fc4f6f303452a91c6364326c509aeff7c1484e4334.css
strongencryption.org/assets/ |
1 KB 585 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-tooltip-44046ca646f13b6e77f78fb2a676dd177bfe770d7c715b0ba5bb56d8d7663bd4.css
strongencryption.org/assets/ |
3 KB 820 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-55c15d8d7a286d55ebb6ed788bc8f0164756751b9423684fab0d627cc5234591.css
strongencryption.org/assets/ |
2 KB 753 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnsf-logo.png
www.bnsf.com/images/placeholders/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-fc5e7621ba0e98c5c6728e3b2bdf802311c0a0953a05e60a7551cb0c7bed00a9.png
strongencryption.org/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Phishing Simulation (Internet)39 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| _typeof boolean| windowIsDefined function| _extends function| FlatpickrInstance function| _flatpickr function| flatpickr function| updateQueryStringParameter function| getParam function| colSort function| ES6Promise function| $ function| jQuery object| jQuery112408461721612667252 function| Retina function| RetinaImagePath function| RetinaImage function| Color function| Chart object| Chartkick function| proj4 function| AjaxBootstrapSelect function| AjaxBootstrapSelectList function| AjaxBootstrapSelectRequest function| Slider object| Utils object| asap_questionaire function| AsapStoreViewer object| Routes function| moment object| FullCalendar function| _ object| ProgressBar object| html5 object| Modernizr object| asap object| kb40 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
spamchallenge.msftemail.com
strongencryption.org
www.bnsf.com
139.51.11.173
54.210.16.126
54.88.249.60
0f75c20db4f00e133dab93fc4f6f303452a91c6364326c509aeff7c1484e4334
36f32b769f5d72e49b86cc0d970d3a62a1b959f8d9ec8c2c780510fd58924604
44046ca646f13b6e77f78fb2a676dd177bfe770d7c715b0ba5bb56d8d7663bd4
46ea054482a4c24d938b4b38a7697c9dbf537b919f1bb91ebbc3431cfbdbb376
55c15d8d7a286d55ebb6ed788bc8f0164756751b9423684fab0d627cc5234591
654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97
820076abdbf0565eb891dc18a7cfd21ed52f98d2bf8996e6d0083dd5c1181bf6
a5c1467a283da00dbe3fe4128657fd9a71aea35657bf77162ad0ff583c3b6b29
c0f75ab45498817ae46f88f27c3d8ad1dd22efbbf9d34a0dbe3919ee889836bd
fc5e7621ba0e98c5c6728e3b2bdf802311c0a0953a05e60a7551cb0c7bed00a9