www.saalesk.net
Open in
urlscan Pro
75.119.200.168
Malicious Activity!
Public Scan
Effective URL: http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/wqai5bc7ynznujnf777erfw1.php?r...
Submission: On January 29 via manual from US
Summary
This is the only time www.saalesk.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 124.6.61.70 124.6.61.70 | 132425 (APC-HOSTI...) (APC-HOSTING-SG APC Hosting Pte Ltd) | |
4 25 | 75.119.200.168 75.119.200.168 | 26347 (DREAMHOST-AS) (DREAMHOST-AS - New Dream Network) | |
1 1 | 13.249.44.12 13.249.44.12 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 1 | 13.249.44.91 13.249.44.91 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 2 | 184.31.83.65 184.31.83.65 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
23 | 3 |
ASN132425 (APC-HOSTING-SG APC Hosting Pte Ltd, SG)
PTR: sg1apcwinpsk02.apc.sg
blog.gneysoftware.com |
ASN26347 (DREAMHOST-AS - New Dream Network, LLC, US)
PTR: apache2-fritz.beetje.dreamhost.com
www.saalesk.net |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-13-249-44-12.iad89.r.cloudfront.net
underarmour.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-13-249-44-91.iad89.r.cloudfront.net
underarmour.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a184-31-83-65.deploy.static.akamaitechnologies.com
www.underarmour.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
25 |
saalesk.net
4 redirects
www.saalesk.net |
197 KB |
4 |
underarmour.com
3 redirects
underarmour.com www.underarmour.com |
1 KB |
2 |
gneysoftware.com
1 redirects
blog.gneysoftware.com |
804 B |
23 | 3 |
Domain | Requested by | |
---|---|---|
25 | www.saalesk.net |
4 redirects
blog.gneysoftware.com
www.saalesk.net |
2 | www.underarmour.com |
1 redirects
www.saalesk.net
|
2 | underarmour.com | 2 redirects |
2 | blog.gneysoftware.com | 1 redirects |
23 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
blog.gneysoftware.com Let's Encrypt Authority X3 |
2019-01-06 - 2019-04-06 |
3 months | crt.sh |
www.underarmour.com DigiCert SHA2 Extended Validation Server CA |
2018-04-06 - 2020-04-05 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/wqai5bc7ynznujnf777erfw1.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&text=Apereira@underarmour.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 30C0D3D07B25BB0C9929F88D2177F8DA
Requests: 23 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://blog.gneysoftware.com/webmail?text=Apereira@underarmour.com
HTTP 301
https://blog.gneysoftware.com/webmail/?text=Apereira@underarmour.com Page URL
-
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202?text=Apere...
HTTP 301
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/?text=Aper... HTTP 302
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/wqai5bc7yn... Page URL
Detected technologies
RoundCube (Web Mail) ExpandDetected patterns
- env /^(?:rcmail|rcube_|roundcube)/i
PHP (Programming Languages) Expand
Detected patterns
- env /^(?:rcmail|rcube_|roundcube)/i
Windows Server (Operating Systems) Expand
Detected patterns
- headers server /IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /IIS(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://blog.gneysoftware.com/webmail?text=Apereira@underarmour.com
HTTP 301
https://blog.gneysoftware.com/webmail/?text=Apereira@underarmour.com Page URL
-
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202?text=Apereira@underarmour.com
HTTP 301
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/?text=Apereira@underarmour.com HTTP 302
http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/wqai5bc7ynznujnf777erfw1.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&text=Apereira@underarmour.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://blog.gneysoftware.com/webmail?text=Apereira@underarmour.com HTTP 301
- https://blog.gneysoftware.com/webmail/?text=Apereira@underarmour.com
- http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/plugins/jqueryui/themes/larry/jquery-ui-1.9.2.custom.css?s=1399644532 HTTP 301
- http://www.saalesk.net/wp-content/uploads/2019/01/mailweb/mailweb/find11/zoom12/view202/plugins/jqueryui/themes/larry/jquery-ui-1.9.2.custom.css?s=1399644532
- http://underarmour.com/favicon.ico HTTP 301
- https://underarmour.com/favicon.ico HTTP 301
- http://www.underarmour.com/favicon.ico HTTP 301
- https://www.underarmour.com/favicon.ico
- http://www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/images/linen.jpg?v=0382.14157 HTTP 301
- http://www.saalesk.net/wp-content/uploads/2019/01/mailweb/mailweb/find11/zoom12/view202/FILES/images/linen.jpg?v=0382.14157
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
blog.gneysoftware.com/webmail/ Redirect Chain
|
180 B 512 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
wqai5bc7ynznujnf777erfw1.php
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/ Redirect Chain
|
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
46 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.css
www.saalesk.net/wp-content/uploads/2019/01/mailweb/mailweb/find11/zoom12/view202/plugins/jqueryui/themes/larry/ Redirect Chain
|
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ui.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
34 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.min.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
13 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.min.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
128 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.min.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.min.js
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/FILES/ |
231 KB 63 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.underarmour.com/ Redirect Chain
|
1 KB 490 B |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
linen.jpg
www.saalesk.net/wp-content/uploads/2019/01/mailweb/mailweb/find11/zoom12/view202/FILES/images/ Redirect Chain
|
24 KB 24 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajaxloader.gif
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 254 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttons.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 255 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
addcontact.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 255 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
filetypes.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 255 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
listicons.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 255 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
messages.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 254 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
quota.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 255 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selector.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 254 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
splitter.png
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 254 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
watermark.jpg
www.saalesk.net/wp-content/uploads/2019/01//mailweb/mailweb/find11/zoom12/view202/skins/larry/images/ |
0 254 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)34 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| MaskedPassword function| rcube_mail_ui function| rcube_scroller function| rcube_splitter function| $ function| jQuery number| CONTROL_KEY number| SHIFT_KEY number| CONTROL_SHIFT_KEY function| roundcube_browser object| rcube_event function| rcube_event_engine function| rcube_check_email function| rcube_clone_object function| urlencode function| rcube_find_object function| rcube_mouse_is_over function| setCookie function| getCookie function| rcube_console object| bw object| Base64 function| rcube_webmail object| jstz object| rcmail function| MM_findObj function| MM_validateForm object| jQuery111005203398709313665 function| DP_jQuery_1548794722803 object| UI object| img1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.saalesk.net/ | Name: PHPSESSID Value: 67c81b75f0a16ce6991c53195e6798cf |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
blog.gneysoftware.com
underarmour.com
www.saalesk.net
www.underarmour.com
124.6.61.70
13.249.44.12
13.249.44.91
184.31.83.65
75.119.200.168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