enelglobal.com
Open in
urlscan Pro
2606:4700:30::681c:3be
Malicious Activity!
Public Scan
Submission: On April 16 via automatic, source openphish
Summary
This is the only time enelglobal.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:30:... 2606:4700:30::681c:3be | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
6 | 2606:4700:30:... 2606:4700:30::681c:2be | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
8 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
enelglobal.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
enelglobal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
enelglobal.com
enelglobal.com |
630 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | enelglobal.com |
enelglobal.com
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://enelglobal.com/Authentication/mailbox/login/newAge/New/step2.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-userid&email=timothy.murphy@owenscorning.com
Frame ID: 106F46DDBD736231F5FACE6C44D76D55
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
step2.php
enelglobal.com/Authentication/mailbox/login/newAge/New/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conv.min.css
enelglobal.com/Authentication/mailbox/login/newAge/New/css/ |
18 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t3.png
enelglobal.com/Authentication/mailbox/login/newAge/New/images/ |
52 KB 53 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logn.png
enelglobal.com/Authentication/mailbox/login/newAge/New/images/ |
523 B 890 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
m9.png
enelglobal.com/Authentication/mailbox/login/newAge/New/images/ |
753 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
small.jpg
enelglobal.com/Authentication/mailbox/login/newAge/New/images/ |
373 B 373 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t1.jpg
enelglobal.com/Authentication/mailbox/login/newAge/New/images/ |
566 KB 566 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csscheckbox_a4824bcf5d413f078bdd6abd3e6e5bf4.png
enelglobal.com/Authentication/mailbox/login/newAge/New/images/ |
895 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| unhideBody1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.enelglobal.com/ | Name: __cfduid Value: d246259114f5e26a4de29c40dd37bc2a31555435840 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
enelglobal.com
2606:4700:30::681c:2be
2606:4700:30::681c:3be
7764c38d71f5ee52d39f237f08b4e82b4715c73bfa0afbaee30a60b0dfd058ca
7b73f03db4759a9a8cfe2860f5af3f4e9be1101dc03ffba61357960947092bb6
9dd5e031a96cb31830ef2fb13009f70f2001f7204e8e96faf0999821e7dd67eb
a082b1de897c01c874a9adebe1176db62100aeca440a0692a000a1da7b361f2b
bfa78ea67ea713093a7e8dd6c44b6aab9e848620d58d5e714bb34b76d6870a88
c2d5ac2e5a041d4925fd77de1880a678ad3638186f57e0970e0e081c6c8812d4
e54ce53a0a4f2c278e22f53f1a263c9b734fefc04eefc2361ce4075d6e7f8d6a
e8fc8a8a07adf6262c1a9b88f2d659a35278ac2e23c49c4870fc454a5b44bcc9