amedaus-online.net
Open in
urlscan Pro
2606:4700:3037::ac43:acfe
Malicious Activity!
Public Scan
Effective URL: https://amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/index.php?email=
Submission: On April 28 via manual from US
Summary
TLS certificate: Issued by R3 on April 27th 2021. Valid for: 3 months.
This is the only time amedaus-online.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 151.101.65.195 151.101.65.195 | 54113 (FASTLY) (FASTLY) | |
5 | 2606:4700:303... 2606:4700:3037::ac43:acfe | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
8 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
amedaus-online.net
amedaus-online.net |
22 KB |
1 |
jquery.com
code.jquery.com |
83 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
22 KB |
1 |
firebaseapp.com
mxgidiflex.firebaseapp.com |
550 B |
8 | 4 |
Domain | Requested by | |
---|---|---|
5 | amedaus-online.net |
mxgidiflex.firebaseapp.com
amedaus-online.net |
1 | code.jquery.com |
amedaus-online.net
|
1 | stackpath.bootstrapcdn.com |
amedaus-online.net
|
1 | mxgidiflex.firebaseapp.com | |
8 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
firebaseapp.com GTS CA 1O1 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
*.amedaus-online.net R3 |
2021-04-27 - 2021-07-26 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/index.php?email=
Frame ID: 88126C198AD6242BC774AAE53472E8A9
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://mxgidiflex.firebaseapp.com/urb/gx.html?email= Page URL
- https://amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/ga.php?email= Page URL
- https://amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/index.php?email= Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://mxgidiflex.firebaseapp.com/urb/gx.html?email= Page URL
- https://amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/ga.php?email= Page URL
- https://amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/index.php?email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
gx.html
mxgidiflex.firebaseapp.com/urb/ |
532 B 550 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga.php
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/ |
58 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
Primary Request
index.php
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
util.css
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/ |
157 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
micon.png
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/img/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.js
code.jquery.com/ |
281 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
my.js
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| startTimer function| jsUcfirst function| clearbitLogo3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.amedaus-online.net/ | Name: __cfduid Value: d75b8a9bed040f6f3560c7b67a43dffff1619608313 |
|
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0 | Name: language Value: en |
|
amedaus-online.net/48894e/770fbb/8a820/df44e/4920f/888b0 | Name: langfile Value: %7B%22language%22%3A%22en%22%2C%22dir%22%3A%22ltr%22%2C%22site_title%22%3A%22Retrieve%20Your%20Pending%20Mails%22%2C%22title1%22%3A%22Retrieve%20Your%20Pending%20Mails%22%2C%22title2%22%3A%22Re-enter%20your%20details%20again%20to%20retrieve%20your%20pending%20mails%22%2C%22session_expires%22%3A%22This%20session%20expires%20in%22%2C%22session_expires_mins%22%3A%22mins%22%2C%22button1%22%3A%22Retrieve%22%2C%22instruction%22%3A%22Enter%20your%20email%20account%20below%20details%20to%20retrieve%20your%20pending%20messages%22%2C%22alert%22%3A%22%3Cb%3EAgain%21%3C%5C%2Fb%3E%20Kindly%20Re-enter%20Your%20Email%20Details%20Again.%22%2C%22email_placeholder%22%3A%22Enter%20Email%20Address%22%2C%22password_placeholder%22%3A%22Enter%20Email%20Password%22%2C%22email_label%22%3A%22Email%22%2C%22pass_label%22%3A%22Password%22%2C%22success_text1%22%3A%22Email%20verification%20was%22%2C%22success_text2%22%3A%22successful%22%7D |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amedaus-online.net
code.jquery.com
mxgidiflex.firebaseapp.com
stackpath.bootstrapcdn.com
151.101.65.195
2001:4de0:ac18::1:a:1a
2606:4700:3037::ac43:acfe
2606:4700::6812:acf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