secured-login.net
Open in
urlscan Pro
3.86.72.54
Malicious Activity!
Public Scan
Effective URL: https://secured-login.net/pages/313117020fbee/XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLz...
Submission: On January 16 via manual from US
Summary
TLS certificate: Issued by Amazon on November 22nd 2019. Valid for: a year.
This is the only time secured-login.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Phishing Simulation (Internet)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 3.224.80.95 3.224.80.95 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
9 | 3.86.72.54 3.86.72.54 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 2606:4700::68... 2606:4700::6811:87b4 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 23.219.92.195 23.219.92.195 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2620:0:862:ed... 2620:0:862:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA - Wikimedia Foundation Inc.) | |
14 | 5 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-3-224-80-95.compute-1.amazonaws.com
ftp.phishing.guru |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-3-86-72-54.compute-1.amazonaws.com
secured-login.net |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.learnersedge.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a23-219-92-195.deploy.static.akamaitechnologies.com
media2.comcast.net |
ASN14907 (WIKIMEDIA - Wikimedia Foundation Inc., US)
upload.wikimedia.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
secured-login.net
secured-login.net |
1 MB |
2 |
comcast.net
media2.comcast.net |
32 B |
1 |
wikimedia.org
upload.wikimedia.org |
90 KB |
1 |
learnersedge.com
www.learnersedge.com |
14 KB |
1 |
phishing.guru
ftp.phishing.guru |
862 B |
14 | 5 |
Domain | Requested by | |
---|---|---|
9 | secured-login.net |
ftp.phishing.guru
secured-login.net |
2 | media2.comcast.net |
secured-login.net
|
1 | upload.wikimedia.org |
secured-login.net
|
1 | www.learnersedge.com |
secured-login.net
|
1 | ftp.phishing.guru | |
14 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
preview.training.knowbe4.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
secured-login.net Amazon |
2019-11-22 - 2020-12-22 |
a year | crt.sh |
www.learnersedge.com CloudFlare Inc ECC CA-2 |
2019-12-24 - 2020-10-09 |
10 months | crt.sh |
*.wikipedia.org DigiCert SHA2 High Assurance Server CA |
2019-11-12 - 2020-10-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://secured-login.net/pages/313117020fbee/XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLzMxMzExNzAyMGZiZWUmcmVjaXBpZW50X2lkPTU2MDMwNDYyNiZjYW1wYWlnbl9ydW5faWQ9Mjc0MTE4Mw==
Frame ID: 007D756558A0E99EADC939B645C83A69
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://ftp.phishing.guru/XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLz... Page URL
- https://secured-login.net/pages/313117020fbee/XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9... Page URL
Detected technologies
Modernizr (JavaScript Libraries) ExpandDetected patterns
- script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: here
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://ftp.phishing.guru/XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLzMxMzExNzAyMGZiZWUmcmVjaXBpZW50X2lkPTU2MDMwNDYyNiZjYW1wYWlnbl9ydW5faWQ9Mjc0MTE4Mw== Page URL
- https://secured-login.net/pages/313117020fbee/XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLzMxMzExNzAyMGZiZWUmcmVjaXBpZW50X2lkPTU2MDMwNDYyNiZjYW1wYWlnbl9ydW5faWQ9Mjc0MTE4Mw== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLzMxMzExNzAyMGZiZWUmcmVjaXBpZW50X2lkPTU2MDMwNDYyNiZjYW1wYWlnbl9ydW5faWQ9Mjc0MTE4Mw==
ftp.phishing.guru/ |
432 B 862 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
XYWNv0aW9uPWkNsaWNrJnzVybD1ocydHRwhczovL3NlcY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLzMxMzExNzAyMGZiZWUmcmVjaXBpZW50X2lkPTU2MDMwNDYyNiZjYW1wYWlnbl9ydW5faWQ9Mjc0MTE4Mw==
secured-login.net/pages/313117020fbee/ |
14 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
application-c20e82b99c2b93e5467c85380cdc8674a937c12a673203ff30f29d88e8432f95.js
secured-login.net/assets/ |
4 MB 971 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor-4e3e36cb1978b5645cd3.js
secured-login.net/packs/js/ |
365 KB 125 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97.js
secured-login.net/assets/ |
50 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-watermark-16f13e16a7ef02fb6f94250aa1931ded83dbee5d9fad278e33dd5792d085194f.css
secured-login.net/assets/ |
1 KB 549 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-modal-24152d098d5744697d79f0a2a169038a204eb8c53a3f6e23b227b178712b53c1.css
secured-login.net/assets/ |
1 KB 578 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-tooltip-15c00abdc9e9462d2538982039515c2ee3a056dfaef70b944c0b234c1dda1270.css
secured-login.net/assets/ |
3 KB 815 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-590a28b756e2e8a0661ceca1971920bd1a0c3579252c8f51c98af4cc357b6e8b.css
secured-login.net/assets/ |
2 KB 748 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SNHU%20Logo.png
www.learnersedge.com/hs-fs/hubfs/ |
13 KB 14 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sp.png
media2.comcast.net/anon.comcastonline2/support/Outbound_email/20%0D%0A14/xfinitymarcom/B/images/ |
16 B 16 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2000px-Xfinity_logo.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/5/58/Xfinity_logo.svg/ |
90 KB 90 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sp.png
media2.comcast.net/anon.comcastonline2/support/Outbound_email/20%0D%0A14/xfinitymarcom/B/images/ |
16 B 16 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-fc5e7621ba0e98c5c6728e3b2bdf802311c0a0953a05e60a7551cb0c7bed00a9.png
secured-login.net/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Phishing Simulation (Internet)47 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| _typeof boolean| windowIsDefined function| _extends function| FlatpickrInstance function| _flatpickr function| flatpickr function| timeToLocal function| timeToLocalTooltip function| updateQueryStringParameter function| getParam function| colSort function| ES6Promise function| $ function| jQuery object| jQuery112404833716751379449 function| Retina function| RetinaImagePath function| RetinaImage function| Color function| Chart object| Chartkick function| proj4 function| AjaxBootstrapSelect function| AjaxBootstrapSelectList function| AjaxBootstrapSelectRequest function| Slider object| Utils object| asap_questionaire function| AsapStoreViewer object| Routes function| moment object| FullCalendar function| _ object| ProgressBar object| ZeroClipboard_TableTools object| __core-js_shared__ object| core function| setImmediate function| clearImmediate object| regeneratorRuntime object| Highcharts object| html5 object| Modernizr object| asap object| kb40 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | |
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ftp.phishing.guru
media2.comcast.net
secured-login.net
upload.wikimedia.org
www.learnersedge.com
23.219.92.195
2606:4700::6811:87b4
2620:0:862:ed1a::2:b
3.224.80.95
3.86.72.54
15c00abdc9e9462d2538982039515c2ee3a056dfaef70b944c0b234c1dda1270
16f13e16a7ef02fb6f94250aa1931ded83dbee5d9fad278e33dd5792d085194f
1e3b732162edb42ae45db702e9833d67a58ae5132f2541e78028a1425c3c83df
24152d098d5744697d79f0a2a169038a204eb8c53a3f6e23b227b178712b53c1
590a28b756e2e8a0661ceca1971920bd1a0c3579252c8f51c98af4cc357b6e8b
654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97
7226455c620707346009e571b755c722f8f6edff750d7042a2cc6c51019f610f
ab5bab9296f6d5d25dfb2d7b6901ae33e4d6b17b3de333738486b272fb96e6e1
b909e095a1ae65ead8865d1bdea91edff9325f756c4a6924290c7f8f13427ebc
b9eecc7cdbe7376fc1e62d2a892838793b63d0cf6aa8d6cd5cc4c6b52a6cfd56
c20e82b99c2b93e5467c85380cdc8674a937c12a673203ff30f29d88e8432f95
fc5e7621ba0e98c5c6728e3b2bdf802311c0a0953a05e60a7551cb0c7bed00a9
fe18db20f4e951542517eedfb7019853afc60990c6e3644240e9c1a256bd4650