logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com
Open in
urlscan Pro
144.217.255.169
Malicious Activity!
Public Scan
Submission: On April 16 via automatic, source openphish
Summary
This is the only time logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 144.217.255.169 144.217.255.169 | 16276 (OVH) (OVH) | |
9 | 2 |
ASN16276 (OVH, FR)
PTR: cp5.rockhoster.biz
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
ativat.com
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com |
788 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com |
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com
|
9 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
passwordreset. |
Subject Issuer | Validity | Valid |
---|
This page contains 4 frames:
Primary Page:
http://logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Signinpass.php
Frame ID: 7819CB1EC4815CE68C2411602F7D5DE7
Requests: 8 HTTP requests in this frame
Frame:
http://logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/portal.office.com/logout?sid=9c2405c3-1ca5-4bbc-b982-a7930e33d52b
Frame ID: B3315209E0B3C086232BC526CD963F2A
Requests: 1 HTTP requests in this frame
Frame:
http://logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Sign%20out_files/logout.txt
Frame ID: E92FCA7996FCEE68B9EA3DC4D7FA9BEC
Requests: 1 HTTP requests in this frame
Frame:
http://logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/outlook.office365.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=9c2405c3-1ca5-4bbc-b982-a7930e33d52b
Frame ID: 2B139F5181683087544FAEB198BB52DE
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Forgot my password
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
Signinpass.php
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/ |
418 KB 418 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.css
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Sign%20out_files/ |
85 KB 85 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Sign%20out_files/ |
108 KB 108 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aad.js
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Sign%20out_files/ |
173 KB 173 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.png
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Sign%20out_files/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account_aad.svg
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/ |
756 B 1001 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
291 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/portal.office.com/ Frame B331 |
341 B 541 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout.txt
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/Sign%20out_files/ Frame E92F |
0 240 B |
Document
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoff.aspx
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/outlook.office365.com/owa/auth/ Frame 2B13 |
359 B 559 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)53 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| $Config object| $Debug object| $Do function| $Loader object| $WebWatson function| GetString function| GetErrorString function| GetUrl object| $B function| $ function| jQuery object| jQuery1112037804472984872217 object| MSLogin object| proxy object| ErrorCodes object| Constants object| Context object| Background object| Logo object| Instrument object| User object| tenant_info object| MSLogout object| ThirdPartyCookieStates object| PostType object| LoginOption object| TenantBranding object| users object| Tiles object| $Api object| EmailDiscovery object| Support object| Post object| StrongAuthCheck object| Util object| WindowsBrowserSso function| SetImageStatus function| ImageTimeout function| IframeTimeout function| MsaTimeout function| TryCompleteSignout function| CompleteSignout function| CompleteSignoutRender function| RenderSignoutSuccess function| RenderSignoutFailure function| WriteSignoutFailedCookie function| InitiatorRedirect object| imageStatusArray boolean| imageStatusTimeout object| updatedUsers number| msaSignoutStatus object| msaSignoutTimerId boolean| iframeStatusTimeout1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com/ | Name: PHPSESSID Value: 4jo8s6oaned08v3ba3vk1qfu25 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
logoon.nhnicrs0fthtnlinnne.configuurrationnnne.ativat.com
144.217.255.169
080ff245615e719959bc5537e164ac4495c4b8036462dfee2076dd92f22c8491
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
62faab60433070e2ea52c235f0f18db228759f2a08bb6f9e5711630df8321214
63ce23bf4b8332c6f5707ae5fb422bc648d41535e03cbe8f3b29e8b6f3e80427
6b45dd55c4ad636857096cc8a3a41f1a04ee06f9cff88b77bcca8285fa512b18
76cd41fcc896872c9fd4ca833501591ab06c84aad80c32cba41793eb9c418c89
88ad72f1d2c05cfce9f4f5183cc23ae6f3cca489b430024104c3cd8244334142
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c
fc28b79ef81125bcf50a93f2175825bb4c6861a2ebc5e0d4de6d804b05d1a49a