ftrica-log.conohawing.com Open in urlscan Pro
118.27.99.23  Malicious Activity! Public Scan

URL: https://ftrica-log.conohawing.com/error/outlook-arsmtp-exghost.com/owa-web-app-exghost.html
Submission: On July 04 via api from HK — Scanned from JP

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 118.27.99.23, located in Japan and belongs to INTERQ GMO Internet,Inc, JP. The main domain is ftrica-log.conohawing.com.
TLS certificate: Issued by GlobalSign GCC R3 DV TLS CA 2020 on September 20th 2023. Valid for: a year.
This is the only time ftrica-log.conohawing.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 118.27.99.23 7506 (INTERQ GM...)
1 2
Apex Domain
Subdomains
Transfer
1 conohawing.com
ftrica-log.conohawing.com
35 KB
1 1
Domain Requested by
1 ftrica-log.conohawing.com
1 1

This site contains no links.

Subject Issuer Validity Valid
*.conohawing.com
GlobalSign GCC R3 DV TLS CA 2020
2023-09-20 -
2024-10-21
a year crt.sh

This page contains 1 frames:

Primary Page: https://ftrica-log.conohawing.com/error/outlook-arsmtp-exghost.com/owa-web-app-exghost.html
Frame ID: 7104C361F3B4109705A2945A0E4BB7CF
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Outlook

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

35 kB
Transfer

154 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request owa-web-app-exghost.html
ftrica-log.conohawing.com/error/outlook-arsmtp-exghost.com/
122 KB
35 KB
Document
General
Full URL
https://ftrica-log.conohawing.com/error/outlook-arsmtp-exghost.com/owa-web-app-exghost.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
118.27.99.23 , Japan, ASN7506 (INTERQ GMO Internet,Inc, JP),
Reverse DNS
www113.conoha.ne.jp
Software
nginx /
Resource Hash
8ff60162a0cbe98d41dcf44aa3fbce2e4dfe425d98d77d8ab41eba85f78a0a33
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
ja-JP,ja;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
sec-ch-ua-mobile
?0
sec-ch-ua-platform
"Win32"

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Thu, 04 Jul 2024 08:42:03 GMT
etag
W/"1e910-61a0e70b469c0"
last-modified
Tue, 04 Jun 2024 11:06:23 GMT
server
nginx
x-content-type-options
nosniff
x-nginx-cache
EXPIRED
x-xss-protection
1; mode=block
truncated
/
20 KB
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
379765ab31aed2e0d3cdef473f0c2a3f0ee46391724fc7a8024e901c261cdcba

Request headers

Accept-Language
ja-JP,ja;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
text/css
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Accept-Language
ja-JP,ja;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

Accept-Language
ja-JP,ja;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

Accept-Language
ja-JP,ja;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence object| sharedStorage

0 Cookies

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://ftrica-log.conohawing.com/error/outlook-arsmtp-exghost.com/owa-web-app-exghost.html
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block