Submitted URL: https://sptfy.es/3i
Effective URL: https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.i...
Submission: On November 14 via automatic, source phishtank — Scanned from ES

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 107.182.128.31, located in Dallas, United States and belongs to AS-SERVERION, US. The main domain is venongg.sa.com.
TLS certificate: Issued by R10 on November 10th 2024. Valid for: 3 months.
This is the only time venongg.sa.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Aruba (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 82.163.176.110 34119 (WILDCARD-...)
1 107.182.128.31 399471 (AS-SERVERION)
3 199.232.192.193 54113 (FASTLY)
4 2
Apex Domain
Subdomains
Transfer
3 imgur.com
i.imgur.com — Cisco Umbrella Rank: 8465
260 KB
1 sa.com
venongg.sa.com
33 KB
1 sptfy.es
sptfy.es
346 B
4 3
Domain Requested by
3 i.imgur.com venongg.sa.com
1 venongg.sa.com
1 sptfy.es 1 redirects
4 3

This site contains no links.

Subject Issuer Validity Valid
venongg.sa.com
R10
2024-11-10 -
2025-02-08
3 months crt.sh
*.imgur.com
Sectigo RSA Domain Validation Secure Server CA
2024-02-15 -
2025-02-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
Frame ID: FAD6AE0DD29169E744F3AB4A556373F9
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Webmail Aruba

Page URL History Show full URLs

  1. https://sptfy.es/3i HTTP 301
    https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAcc... Page URL

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

293 kB
Transfer

292 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://sptfy.es/3i HTTP 301
    https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request cssl.htm
venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/
Redirect Chain
  • https://sptfy.es/3i
  • https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
32 KB
33 KB
Document
General
Full URL
https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
107.182.128.31 Dallas, United States, ASN399471 (AS-SERVERION, US),
Reverse DNS
Software
Apache /
Resource Hash
e5e5d3b542435359869434a4abff90a6a20d8cb721e8c7371dba912b304d907e

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

Accept-Ranges
bytes
Connection
Keep-Alive
Content-Length
33038
Content-Type
text/html
Date
Thu, 14 Nov 2024 16:41:09 GMT
Keep-Alive
timeout=5, max=100
Last-Modified
Thu, 14 Nov 2024 09:24:25 GMT
Server
Apache

Redirect headers

cache-control
max-age=0
content-type
text/html; charset=UTF-8
date
Thu, 14 Nov 2024 16:41:09 GMT
expires
Thu, 14 Nov 2024 16:41:08 GMT
location
https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
referrer-policy
no-referrer-when-downgrade
server
nginx
x-robots-tag
noindex
SCSPzi4.png
i.imgur.com/
2 KB
2 KB
Image
General
Full URL
https://i.imgur.com/SCSPzi4.png
Requested by
Host: venongg.sa.com
URL: https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.192.193 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
3b7a295f7a4bab99ddaedb9798544a95e579a4efce4b3170c936f240026cca32
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://venongg.sa.com/

Response headers

etag
"55c93dd10c32a4bbb55b9db8028780ca"
age
805876
access-control-allow-methods
GET, OPTIONS
x-content-type-options
nosniff
x-cache
Miss from cloudfront, HIT, HIT
x-amz-cf-id
lBeNO1luRIUW1MTdVEG9oFUcKytRmW_QAel38ui0ACh2IhS8m-6IZA==
date
Thu, 14 Nov 2024 16:41:10 GMT
content-type
image/png
last-modified
Wed, 17 Jan 2024 17:34:39 GMT
x-cache-hits
101, 0
x-served-by
cache-iad-kiad7000162-IAD, cache-mad22043-MAD
strict-transport-security
max-age=300
cache-control
public, max-age=31536000
x-timer
S1731602470.085469,VS0,VE2
accept-ranges
bytes
access-control-allow-origin
*
content-length
1906
x-amz-cf-pop
IAD89-P1
server
cat factory 1.0
x-amz-server-side-encryption
AES256
l8EQonT.png
i.imgur.com/
257 KB
257 KB
Image
General
Full URL
https://i.imgur.com/l8EQonT.png
Requested by
Host: venongg.sa.com
URL: https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.192.193 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
effc5e1c24bed120cb6764f5dff8bfbf2fbbbe94b96d7e6ff538b0730a16c1b3
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://venongg.sa.com/

Response headers

etag
"2afa338f6f65e824e142ac635b549245"
age
29418
access-control-allow-methods
GET, OPTIONS
x-content-type-options
nosniff
x-cache
Miss from cloudfront, HIT, HIT
x-amz-cf-id
0P8gLGuq9uL7PdDPBFhBECv3SIqJ4yMoocBWv6q6VBy3Ular04YU5g==
date
Thu, 14 Nov 2024 16:41:10 GMT
content-type
image/png
last-modified
Thu, 14 Nov 2024 08:30:52 GMT
x-cache-hits
18, 0
x-served-by
cache-iad-kjyo7100075-IAD, cache-mad22043-MAD
strict-transport-security
max-age=300
cache-control
public, max-age=31536000
x-timer
S1731602470.085491,VS0,VE2
accept-ranges
bytes
access-control-allow-origin
*
content-length
263138
x-amz-cf-pop
MIA50-P3
server
cat factory 1.0
x-amz-server-side-encryption
AES256
20hdBFK.png
i.imgur.com/
609 B
828 B
Other
General
Full URL
https://i.imgur.com/20hdBFK.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.192.193 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
ca8abfd1e71a10c486a26be86954293c5f62e1ff94ac52f9270a41c285243c5a
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://venongg.sa.com/

Response headers

etag
"0ecb135733886ee9f5b6b3fb54baa6cf"
age
766413
access-control-allow-methods
GET, OPTIONS
x-content-type-options
nosniff
x-cache
Miss from cloudfront, HIT, HIT
x-amz-cf-id
WX5RIiv9RLL5f427D-PwwMxLjOlR6_ejO3XwBsrYvBvw80bshBWDRQ==
date
Thu, 14 Nov 2024 16:41:10 GMT
content-type
image/png
last-modified
Tue, 31 May 2022 07:42:56 GMT
x-cache-hits
194, 0
x-served-by
cache-iad-kiad7000120-IAD, cache-mad22043-MAD
strict-transport-security
max-age=300
cache-control
public, max-age=31536000
x-timer
S1731602470.278857,VS0,VE1
accept-ranges
bytes
access-control-allow-origin
*
content-length
609
x-amz-cf-pop
IAD89-P3
server
cat factory 1.0

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Aruba (Online)

8 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| _A50H35mL12qk99eWjM12SQ049X1R4ejpfo function| _QTW7v07E7O88q9h34lb8s995Gkyp1qUk0c1B3e75Bz object| _$ object| _V77u0W95chN2s6C2VUJ84CW9S number| _D0S246T0881I4cS3K907pW5iY75jOeEZnYTC8xOgKjw334F object| _WB0KDTM76i2UD0zV3VK object| _Lm10XZapTpHikci0EGx1Hbug8RKH0Ok48yXJRYdb object| _YuYfU6W7jGd081eXnOuti4t1NY

0 Cookies

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://venongg.sa.com/urssl/mxaruba.it_arubauser.MsG.fix_receptionErrorMSG_aruba.user.SignIn.MyAccount/mailbox.aruba.id/cssl.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o