btinternet.com.inboxloadu.icu Open in urlscan Pro
40.89.143.128  Malicious Activity! Public Scan

URL: http://btinternet.com.inboxloadu.icu/message/read/27431119
Submission: On June 18 via manual from IN

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 40.89.143.128, located in Paris, France and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is btinternet.com.inboxloadu.icu.
This is the only time btinternet.com.inboxloadu.icu was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
3 40.89.143.128 8075 (MICROSOFT...)
3 2
Apex Domain
Subdomains
Transfer
3 inboxloadu.icu
btinternet.com.inboxloadu.icu
357 KB
3 1
Domain Requested by
3 btinternet.com.inboxloadu.icu btinternet.com.inboxloadu.icu
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://btinternet.com.inboxloadu.icu/message/read/27431119
Frame ID: 92AE80F1DB25A67109DB2FB699473DD9
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

357 kB
Transfer

362 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 27431119
btinternet.com.inboxloadu.icu/message/read/
286 KB
286 KB
Document
General
Full URL
http://btinternet.com.inboxloadu.icu/message/read/27431119
Protocol
HTTP/1.1
Server
40.89.143.128 Paris, France, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.17.9 /
Resource Hash
ae399b247acad87947fac80dce6025d8db88bbdd6dded1a2a2c02878fafcebbe

Request headers

Host
btinternet.com.inboxloadu.icu
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
292812
Content-Type
text/html; charset=utf-8
Date
Thu, 18 Jun 2020 17:05:15 GMT
Server
nginx/1.17.9
X-Response-Time
195ms
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Referer
http://btinternet.com.inboxloadu.icu/message/read/27431119
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
470e216854f8b5bad5eba06805e22a84.png
btinternet.com.inboxloadu.icu/
71 KB
71 KB
Image
General
Full URL
http://btinternet.com.inboxloadu.icu/470e216854f8b5bad5eba06805e22a84.png
Requested by
Host: btinternet.com.inboxloadu.icu
URL: http://btinternet.com.inboxloadu.icu/message/read/27431119
Protocol
HTTP/1.1
Server
40.89.143.128 Paris, France, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.17.9 /
Resource Hash
d4dc7faefc5944071e953752263597e05232f50dfbebb10a95fcb8d547972e87

Request headers

Referer
http://btinternet.com.inboxloadu.icu/message/read/27431119
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

X-Response-Time
2ms
Date
Thu, 18 Jun 2020 17:05:15 GMT
Cache-Control
max-age=0
Last-Modified
Tue, 16 Jun 2020 08:36:03 GMT
Server
nginx/1.17.9
Content-Length
72250
Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

Referer
http://btinternet.com.inboxloadu.icu/message/read/27431119
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
27431119
btinternet.com.inboxloadu.icu/message/read/
0
0
Fetch
General
Full URL
http://btinternet.com.inboxloadu.icu/message/read/27431119
Requested by
Host: btinternet.com.inboxloadu.icu
URL: http://btinternet.com.inboxloadu.icu/message/read/27431119
Protocol
HTTP/1.1
Server
40.89.143.128 Paris, France, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.17.9 /
Resource Hash

Request headers

Referer
http://btinternet.com.inboxloadu.icu/message/read/27431119
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
application/json

Response headers

Date
Thu, 18 Jun 2020 17:05:16 GMT
Server
nginx/1.17.9
Content-Length
0
Content-Type
text/plain; charset=utf-8

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate string| id object| a0a function| a0b

0 Cookies