adobesign.fiopower.com
Open in
urlscan Pro
84.38.134.214
Malicious Activity!
Public Scan
Effective URL: https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ==
Submission: On February 02 via manual from US — Scanned from PL
Summary
TLS certificate: Issued by R3 on January 31st 2024. Valid for: 3 months.
This is the only time adobesign.fiopower.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 156.17.16.240 156.17.16.240 | 8970 (WASK WROC...) (WASK WROCMAN-EDU educational part of WASK network) | |
1 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
8 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
2 | 40.126.31.73 40.126.31.73 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 1 | 34.117.33.233 34.117.33.233 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
1 3 | 84.38.134.214 84.38.134.214 | 52048 (DATACLUB) (DATACLUB) | |
14 | 5 |
ASN8970 (WASK WROCMAN-EDU educational part of WASK network, Wroclaw, Poland, PL)
pwr.edu.pl |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 233.33.117.34.bc.googleusercontent.com
supacasign.replit.app |
ASN52048 (DATACLUB, BZ)
PTR: ip-134-214.dataclub.info
adobesign.fiopower.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 943 |
222 KB |
3 |
fiopower.com
1 redirects
adobesign.fiopower.com 71f49a0d-15def2df.fiopower.com Failed |
89 KB |
2 |
live.com
login.live.com — Cisco Umbrella Rank: 63 |
2 KB |
1 |
replit.app
1 redirects
supacasign.replit.app |
342 B |
1 |
elo.foundation
elo.foundation |
9 KB |
1 |
pwr.edu.pl
1 redirects
pwr.edu.pl |
473 B |
14 | 6 |
Domain | Requested by | |
---|---|---|
8 | aadcdn.msftauth.net |
elo.foundation
|
3 | adobesign.fiopower.com |
1 redirects
elo.foundation
|
2 | login.live.com |
elo.foundation
|
1 | supacasign.replit.app | 1 redirects |
1 | elo.foundation | |
1 | pwr.edu.pl | 1 redirects |
0 | 71f49a0d-15def2df.fiopower.com Failed |
adobesign.fiopower.com
|
14 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
app.darum.com.ng GTS CA 1D4 |
2024-01-23 - 2024-04-22 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
login.live.com DigiCert SHA2 Secure Server CA |
2023-11-10 - 2024-11-10 |
a year | crt.sh |
fiopower.com R3 |
2024-01-31 - 2024-04-30 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ==
Frame ID: EED0BBFD53B52DDDB6A1F1D70F9EA444
Requests: 13 HTTP requests in this frame
Frame:
https://login.live.com/Me.htm?v=3
Frame ID: 72126E2F8F85465E94ACE57E6D924A81
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://pwr.edu.pl/redirect.php?u=https%3A%2F%2Felo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-Q...
HTTP 302
https://elo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5 Page URL
-
https://supacasign.replit.app/wp-rss.php?url=https://elo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv...
HTTP 302
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ== Page URL
-
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ==
HTTP 302
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ== Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://pwr.edu.pl/redirect.php?u=https%3A%2F%2Felo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5&t=jDfCBkRmlnDTpYL25VZX48bns7PBIDbSQ-PQ4jdiYqPwINaSMXZHIFbFVuNg
HTTP 302
https://elo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5 Page URL
-
https://supacasign.replit.app/wp-rss.php?url=https://elo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5
HTTP 302
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ== Page URL
-
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ==
HTTP 302
https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://pwr.edu.pl/redirect.php?u=https%3A%2F%2Felo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5&t=jDfCBkRmlnDTpYL25VZX48bns7PBIDbSQ-PQ4jdiYqPwINaSMXZHIFbFVuNg HTTP 302
- https://elo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5
- https://supacasign.replit.app/wp-rss.php?url=https://elo.foundation/kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5 HTTP 302
- https://adobesign.fiopower.com/?organisation=servicenow.com&=a2V2aW4ubWNicmlkZUBzZXJ2aWNlbm93LmNvbQ==
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
kQ3Ev4RAn-d5-y58Kv-4Gr4RAdQ3El-QsQ3Erv4RA8KvQ3Enow-d58Kvo-y5
elo.foundation/ Redirect Chain
|
29 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_kfhrfyfy-sm2tmkm5ficcw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
108 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLogin_PCore_a6PeIgafSneuouox-qU5OA2.js
aadcdn.msftauth.net/shared/1.0/content/js/ |
459 KB 126 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en-gb.min_-hjcgqxfzfu0cwzblacdqq2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
42 KB 13 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oneDs_472fa3a12b65cf387ccd.js
aadcdn.msftauth.net/shared/1.0/content/js/ |
78 KB 26 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
convergedlogin_pfetchsessionsprogress_12dabd9245715d165757.js
aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/ |
15 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Me.htm
login.live.com/ |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_kfhrfyfy-sm2tmkm5ficcw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 20 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en-gb.min_-hjcgqxfzfu0cwzblacdqq2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 12 KB |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Me.htm
login.live.com/ Frame 7212 |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 835 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
adobesign.fiopower.com/ Redirect Chain
|
267 KB 88 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
adobesign.fiopower.com/ Redirect Chain
|
64 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
BssoInterrupt_Core_aoxn9LgNNeyAz3OYDcN7uA2.js
71f49a0d-15def2df.fiopower.com/shared/1.0/content/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- 71f49a0d-15def2df.fiopower.com
- URL
- https://71f49a0d-15def2df.fiopower.com/shared/1.0/content/js/BssoInterrupt_Core_aoxn9LgNNeyAz3OYDcN7uA2.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pwr.edu.pl/ | Name: EDUWEBSESSID Value: 1fe86340a9ee7f9ffb018d675c682f0e |
|
.login.live.com/ | Name: MSPRequ Value: id=N<=1706847449&co=1 |
|
.login.live.com/ | Name: uaid Value: 87125fd1876f4905af49c1081587d35b |
|
.fiopower.com/ | Name: 47FfPw Value: "MTVkZWYyZGYtZmQ1MS00ZTEyLWE4ZWItNzA0YzM4OTkzYzJmOjlhODM2YzU5LTQ0YzgtNDc4MC04NTcxLTAzN2UwZDM2ZGMyZQ==" |
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
71f49a0d-15def2df.fiopower.com
aadcdn.msftauth.net
adobesign.fiopower.com
elo.foundation
login.live.com
pwr.edu.pl
supacasign.replit.app
71f49a0d-15def2df.fiopower.com
152.199.23.37
156.17.16.240
199.36.158.100
34.117.33.233
40.126.31.73
84.38.134.214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