links.class-server.nl
Open in
urlscan Pro
185.30.204.98
Malicious Activity!
Public Scan
Effective URL: https://links.class-server.nl/4
Submission: On June 18 via api from LU — Scanned from NL
Summary
TLS certificate: Issued by R3 on April 20th 2022. Valid for: 3 months.
This is the only time links.class-server.nl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 185.30.204.98 185.30.204.98 | 51088 (A2B) (A2B) | |
5 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
class-server.nl
1 redirects
links.class-server.nl transactions.class-server.nl Failed |
379 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | links.class-server.nl |
1 redirects
links.class-server.nl
|
0 | transactions.class-server.nl Failed |
links.class-server.nl
|
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
api.class-server.nl R3 |
2022-04-20 - 2022-07-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://links.class-server.nl/4
Frame ID: 8F1D03E29D3D59F870227BA285866623
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
OutlookOutlook GraficomPage URL History Show full URLs
-
http://links.class-server.nl/4
HTTP 301
https://links.class-server.nl/4 Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://links.class-server.nl/4
HTTP 301
https://links.class-server.nl/4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
4
links.class-server.nl/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.b38c5344.chunk.css
links.class-server.nl/static/css/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.7c477411.chunk.js
links.class-server.nl/static/js/ |
293 KB 294 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.387dddda.chunk.js
links.class-server.nl/static/js/ |
81 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
false
transactions.class-server.nl/Phishing/RegisterOpened/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- transactions.class-server.nl
- URL
- https://transactions.class-server.nl/Phishing/RegisterOpened/false
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation object| webpackJsonpphishingservice object| regeneratorRuntime number| 2f1acc6c3a606b082e5eef5e54414ffb0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
links.class-server.nl
transactions.class-server.nl
transactions.class-server.nl
185.30.204.98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