loginlibero.adrenakite.it
Open in
urlscan Pro
31.11.35.18
Malicious Activity!
Public Scan
Effective URL: https://loginlibero.adrenakite.it/aruba/webmail/
Submission: On June 21 via automatic, source phishtank — Scanned from IT
Summary
TLS certificate: Issued by Actalis Domain Validation Server CA G3 on October 26th 2021. Valid for: a year.
This is the only time loginlibero.adrenakite.it was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Aruba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 3 | 31.11.35.18 31.11.35.18 | 31034 (ARUBA-ASN) (ARUBA-ASN) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 4 |
ASN31034 (ARUBA-ASN, IT)
PTR: webs35-018.aruba.it
loginlibero.adrenakite.it |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
adrenakite.it
2 redirects
loginlibero.adrenakite.it |
201 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 329 |
34 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 686 |
30 KB |
3 | 3 |
Domain | Requested by | |
---|---|---|
3 | loginlibero.adrenakite.it | 2 redirects |
1 | ajax.googleapis.com |
loginlibero.adrenakite.it
|
1 | code.jquery.com |
loginlibero.adrenakite.it
|
3 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
webmail.aruba.it |
www.aruba.it |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.adrenakite.it Actalis Domain Validation Server CA G3 |
2021-10-26 - 2022-11-26 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-05-30 - 2022-08-22 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://loginlibero.adrenakite.it/aruba/webmail/
Frame ID: D6642964D5EEDA29A024A495D7DD8C50
Requests: 11 HTTP requests in this frame
Frame:
data://truncated
Frame ID: D5A885A663E6F7890300E60784EA18B6
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://loginlibero.adrenakite.it/aruba/
HTTP 302
https://loginlibero.adrenakite.it/aruba/webmail HTTP 301
https://loginlibero.adrenakite.it/aruba/webmail/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Versione accessibile
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Title: Cookie policy
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://loginlibero.adrenakite.it/aruba/
HTTP 302
https://loginlibero.adrenakite.it/aruba/webmail HTTP 301
https://loginlibero.adrenakite.it/aruba/webmail/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
loginlibero.adrenakite.it/aruba/webmail/ Redirect Chain
|
200 KB 200 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
681 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
751 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
666 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
585 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
947 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.4/ |
95 KB 34 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame D5A8 |
68 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Aruba (Online)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation function| $ function| jQuery function| onuserin function| onpassin function| onuserout function| onpassout function| dologin function| togglevisible function| postmaster function| acedi0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
code.jquery.com
loginlibero.adrenakite.it
2001:4de0:ac18::1:a:2b
2a00:1450:4001:810::200a
31.11.35.18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