![](/screenshots/039e3e35-6ed6-46d7-9030-48163e02958e.png)
epistasy.sa.com
Open in
urlscan Pro
104.21.51.225
Malicious Activity!
Public Scan
Submission: On February 21 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by GTS CA 1P5 on February 19th 2023. Valid for: 3 months.
This is the only time epistasy.sa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Orange (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 104.21.51.225 104.21.51.225 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
6 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
sa.com
epistasy.sa.com |
111 KB |
1 |
firebaseapp.com
smtp1-edbef.firebaseapp.com |
754 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | epistasy.sa.com |
epistasy.sa.com
|
1 | smtp1-edbef.firebaseapp.com |
epistasy.sa.com
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.epistasy.sa.com GTS CA 1P5 |
2023-02-19 - 2023-05-20 |
3 months | crt.sh |
firebaseapp.com GTS CA 1D4 |
2022-12-20 - 2023-03-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://epistasy.sa.com/OB/
Frame ID: 4FEEC8B9ABD424885B1E78EE996490FE
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
epistasy.sa.com/OB/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smtp.js
smtp1-edbef.firebaseapp.com/ |
871 B 754 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
epistasy.sa.com/OB/css/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
epistasy.sa.com/OB/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sidebar.png
epistasy.sa.com/OB/img/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer.png
epistasy.sa.com/OB/img/ |
74 KB 75 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Orange (Telecommunication)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| oncontentvisibilityautostatechange object| Email function| sendMail0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
epistasy.sa.com
smtp1-edbef.firebaseapp.com
104.21.51.225
199.36.158.100
13932f88589d81bd36e281c1a4248b428a2a2740627199ce0a411ea96cc20826
1fd711cb491a361ef91e29c50de0680a4b156c0b34bb91e18570d0037263a776
5ca79c05b41c5b56a993a8358fc2002d46f48676e5ecf8b643496c49421d1a9a
8dab2dc2566251e916a476c846ea0ed1ce459d26917a088146765ea6b2bef997
b36e8ca10880ffc8a3903cd991589fbbe8aa75cbff6315f475be1ed0e9bda472
f6c90b7db38e12494f591eaec3dd476e50e3217026732d9918952e747d80850f