dadivosos.sa.com
Open in
urlscan Pro
185.221.216.115
Malicious Activity!
Public Scan
Effective URL: https://dadivosos.sa.com/js/webmailbeta.aruba.it/main.user_aruba.verifica/mailbox.aruba.sign_in/index.htm
Submission: On September 10 via manual from PH — Scanned from DE
Summary
TLS certificate: Issued by R11 on August 23rd 2024. Valid for: 3 months.
This is the only time dadivosos.sa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Aruba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 94.199.200.174 94.199.200.174 | 42807 (AEROTEK-AS) (AEROTEK-AS) | |
1 | 185.221.216.115 185.221.216.115 | 393960 (HOST4GEEK...) (HOST4GEEKS-LLC) | |
3 | 199.232.192.193 199.232.192.193 | 54113 (FASTLY) (FASTLY) | |
4 | 2 |
ASN393960 (HOST4GEEKS-LLC, US)
PTR: sokhanedoost.com
dadivosos.sa.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
imgur.com
i.imgur.com — Cisco Umbrella Rank: 7108 |
259 KB |
1 |
sa.com
dadivosos.sa.com |
33 KB |
1 |
nkisa.link
1 redirects
nkisa.link |
485 B |
4 | 3 |
Domain | Requested by | |
---|---|---|
3 | i.imgur.com |
dadivosos.sa.com
|
1 | dadivosos.sa.com | |
1 | nkisa.link | 1 redirects |
4 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dadivosos.sa.com R11 |
2024-08-23 - 2024-11-21 |
3 months | crt.sh |
*.imgur.com Sectigo RSA Domain Validation Secure Server CA |
2024-02-15 - 2025-02-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://dadivosos.sa.com/js/webmailbeta.aruba.it/main.user_aruba.verifica/mailbox.aruba.sign_in/index.htm
Frame ID: F3255A1A8F0B3AB9A79E29A74E4CC9DE
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Webmail ArubaPage URL History Show full URLs
-
https://nkisa.link/owYjJ
HTTP 301
https://dadivosos.sa.com/js/webmailbeta.aruba.it/main.user_aruba.verifica/mailbox.aruba.sign_in/index... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://nkisa.link/owYjJ
HTTP 301
https://dadivosos.sa.com/js/webmailbeta.aruba.it/main.user_aruba.verifica/mailbox.aruba.sign_in/index.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.htm
dadivosos.sa.com/js/webmailbeta.aruba.it/main.user_aruba.verifica/mailbox.aruba.sign_in/ Redirect Chain
|
33 KB 33 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
InC2AcA.png
i.imgur.com/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XqLrK4C.png
i.imgur.com/ |
255 KB 256 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
20hdBFK.png
i.imgur.com/ |
609 B 832 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Aruba (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _TnvD4h58gdI59ysb45Rcn1oyyI8S39T7LDG0U0DYCLNKHpfo function| _XEs5oG59W9h3nQY3KK8NBxY057j0R63Uw28gpAf7xXMfV5kvM object| _$ object| _LaIQ84Ms8rZH09r8gfj8EH9A25CgyT2Ksb3MIs37q number| _SpP66Vb3kXEg95Sa9o2uD98LO object| _JJvC0a2dy0Wh421p9aNS4g object| _VFrGvH27MR9xPiQ64 object| _BwtI52wKNbxUdf1qZTJ26m5Ak5BI2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nkisa.link/ | Name: PHPSESSID Value: 9d9aefbdcc037c654457835e74ecd0c0 |
|
nkisa.link/ | Name: short_876 Value: 1 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dadivosos.sa.com
i.imgur.com
nkisa.link
185.221.216.115
199.232.192.193
94.199.200.174
1b0872bf34d2f0427ba38da1615b575cde9704a827c16a2207292fe510fb21c9
501c4206437492e5db8acbfbb4cc71cfc97286950fc2c50275e57e9667be8ecf
bbcdba4675d85ee2908b4962ddf715e6c4e5a7270882cf5383b2454b290787f0
ca8abfd1e71a10c486a26be86954293c5f62e1ff94ac52f9270a41c285243c5a