jaluzi-tut.by
Open in
urlscan Pro
2a0a:7d80:1:7::100:48
Malicious Activity!
Public Scan
Submission: On February 03 via manual from US
Summary
This is the only time jaluzi-tut.by was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: US Universities (Education)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2a0a:7d80:1:7... 2a0a:7d80:1:7::100:48 | 6697 (BELPAK-AS...) (BELPAK-AS BELPAK) | |
4 | 134.126.6.131 134.126.6.131 | 10357 (JMUNET) (JMUNET) | |
13 | 2 |
ASN10357 (JMUNET, US)
PTR: login.jmu.edu
login.jmu.edu |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
jaluzi-tut.by
jaluzi-tut.by |
46 KB |
4 |
jmu.edu
login.jmu.edu |
49 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
9 | jaluzi-tut.by |
jaluzi-tut.by
|
4 | login.jmu.edu |
jaluzi-tut.by
|
13 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.jmu.edu |
login.jmu.edu |
Subject Issuer | Validity | Valid | |
---|---|---|---|
login.jmu.edu InCommon RSA Server CA |
2020-01-13 - 2022-01-12 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://jaluzi-tut.by/bx/jmu/
Frame ID: 15F2481DE8072C32AF6257E11E027E86
Requests: 13 HTTP requests in this frame
7 Outgoing links
These are links going to different origins than the main page.
Title: Help
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Title: Logout
Search URL Search Domain Scan URL
Title: Applicants - Forgot your Password?
Search URL Search Domain Scan URL
Title: Students/Faculty/Staff/Affiliates - Forgot your Password?
Search URL Search Domain Scan URL
Title: James Madison University Acceptable Use Policy
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
jaluzi-tut.by/bx/jmu/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
idm_uio.css
jaluzi-tut.by/bx/jmu/index_files/ |
8 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
idm_mobile.css
jaluzi-tut.by/bx/jmu/index_files/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js.download
jaluzi-tut.by/bx/jmu/index_files/ |
86 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js.download
jaluzi-tut.by/bx/jmu/index_files/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
idm.js.download
jaluzi-tut.by/bx/jmu/index_files/ |
23 B 251 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginpage.js.download
jaluzi-tut.by/bx/jmu/index_files/ |
801 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login_page.png
login.jmu.edu/images/headers/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
seal01002.png
login.jmu.edu/images/ |
41 KB 42 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error.png
login.jmu.edu/images/silk/ |
666 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
exclamation.png
login.jmu.edu/images/silk/ |
701 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.cgi
jaluzi-tut.by/cgi-bin/timecheck/ |
344 B 519 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
information.html
jaluzi-tut.by/docs/ |
4 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: US Universities (Education)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| $error string| error1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jaluzi-tut.by/ | Name: 933d0cb82346bffd1a8576e21c091972 Value: ilglsppvr8tpikisea4r4ckaf6 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jaluzi-tut.by
login.jmu.edu
134.126.6.131
2a0a:7d80:1:7::100:48
011f4e33d86b448078a2bd56b7060770b2c079e86aad2b7298ab0db216758f34
03675e0468a49bd391f9a5884df58ae0733a0e1ab1c2b5933c35abf407dded93
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
4f4d7fe1e003476ba160a85d9fa576c3d4130810e16d197ac3c6dfb633fca78f
51f7b654e570c811bd982327dba5521f35a86e512809358a0a591cc38d20a94e
5fe99faae36cab30611b7aa71945292de11837eac045518242884eec2b3b06d4
771d7ad99a9bd10e3846f8932a733b0517613a6126e51212d1f8d9703c725dbe
b53bf07a142bb44352453cba670432ce34df3abb4120259b5b667271449601ea
c89b56c55b934b1f05ef01d47aa7169b5ca0322c37d1fcf62b067d660eb29f12
d62a29f007a1d9bb7be14b98fbf95065bfc9fc284ebb34682f867402083ce34f
d8ac8d9fb11ec49917089987b2472be6cc9be470bb59fe952180a13dd223d174
f36f71a3d0e791bb7695901c0c4011e82c3d77b973f9b30d7c7bf9943f3ee29c
f54232a94895d1c0b7515ba5596568ebd49d2c83a2454b3845a3578487b5372f