login.accessingfiles.com Open in urlscan Pro
188.166.4.247  Malicious Activity! Public Scan

Submitted URL: https://504054.accessingfiles1.com/hubinternational/#.aHR0cHM6Ly9sb2dpbi5hY2Nlc3NpbmdmaWxlcy5jb20vaUVMVGVSTmcjODY0NjE3MjcyNjU2ZTJlN...
Effective URL: https://login.accessingfiles.com/iELTeRNg
Submission: On October 01 via api from GB — Scanned from GB

Summary

This website contacted 5 IPs in 3 countries across 4 domains to perform 4 HTTP transactions. The main IP is 188.166.4.247, located in Amsterdam, Netherlands and belongs to DIGITALOCEAN-ASN, US. The main domain is login.accessingfiles.com.
TLS certificate: Issued by R3 on September 12th 2022. Valid for: 3 months.
This is the only time login.accessingfiles.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 162.215.222.33 46606 (UNIFIEDLA...)
1 188.166.4.247 14061 (DIGITALOC...)
1 2 2606:4700:20:... 13335 (CLOUDFLAR...)
1 163.181.56.175 24429 (TAOBAO Zh...)
4 5
Apex Domain
Subdomains
Transfer
2 picsum.photos
picsum.photos — Cisco Umbrella Rank: 65682
i.picsum.photos — Cisco Umbrella Rank: 95807
4 KB
1 126.net
cstaticdun.126.net — Cisco Umbrella Rank: 59607
12 KB
1 accessingfiles.com
login.accessingfiles.com
11 KB
1 accessingfiles1.com
504054.accessingfiles1.com
1 KB
4 4
Domain Requested by
1 cstaticdun.126.net login.accessingfiles.com
1 i.picsum.photos login.accessingfiles.com
1 picsum.photos 1 redirects
1 login.accessingfiles.com 504054.accessingfiles1.com
1 504054.accessingfiles1.com
4 5

This site contains no links.

Subject Issuer Validity Valid
*.accessingfiles1.com
Sectigo RSA Domain Validation Secure Server CA
2022-09-21 -
2023-09-21
a year crt.sh
login.accessingfiles.com
R3
2022-09-12 -
2022-12-11
3 months crt.sh
*.126.net
GeoTrust RSA CN CA G2
2021-11-30 -
2022-12-05
a year crt.sh

This page contains 1 frames:

Primary Page: https://login.accessingfiles.com/iELTeRNg
Frame ID: 91648F529916B112BD28E0FB1025CAD4
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Captcha

Page URL History Show full URLs

  1. https://504054.accessingfiles1.com/hubinternational/ Page URL
  2. https://login.accessingfiles.com/iELTeRNg Page URL

Page Statistics

4
Requests

75 %
HTTPS

25 %
IPv6

4
Domains

5
Subdomains

5
IPs

3
Countries

28 kB
Transfer

28 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://504054.accessingfiles1.com/hubinternational/ Page URL
  2. https://login.accessingfiles.com/iELTeRNg Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://picsum.photos/300/150/?image=769 HTTP 302
  • https://i.picsum.photos/id/769/300/150.jpg?hmac=8Zjo-h0Ws4GxZy84lHvmoEvQBaw8NgojUGRaRWWtOO0

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
504054.accessingfiles1.com/hubinternational/
1 KB
1 KB
Document
General
Full URL
https://504054.accessingfiles1.com/hubinternational/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.215.222.33 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
5722748.cotranorg.com
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

accept-ranges
bytes
content-length
1301
content-type
text/html
date
Sat, 01 Oct 2022 06:24:47 GMT
server
Apache
Primary Request iELTeRNg
login.accessingfiles.com/
11 KB
11 KB
Document
General
Full URL
https://login.accessingfiles.com/iELTeRNg
Requested by
Host: 504054.accessingfiles1.com
URL: https://504054.accessingfiles1.com/hubinternational/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
188.166.4.247 Amsterdam, Netherlands, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
/
Resource Hash
51acd9317f8839f64a6e8a56ae22ce5097ef540584d128015015b66c602d3a83

Request headers

Referer
https://504054.accessingfiles1.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

Connection
close
Content-Type
text/html
Transfer-Encoding
chunked
150.jpg
i.picsum.photos/id/769/300/
Redirect Chain
  • https://picsum.photos/300/150/?image=769
  • https://i.picsum.photos/id/769/300/150.jpg?hmac=8Zjo-h0Ws4GxZy84lHvmoEvQBaw8NgojUGRaRWWtOO0
3 KB
4 KB
Image
General
Full URL
https://i.picsum.photos/id/769/300/150.jpg?hmac=8Zjo-h0Ws4GxZy84lHvmoEvQBaw8NgojUGRaRWWtOO0
Requested by
Host: login.accessingfiles.com
URL: https://login.accessingfiles.com/iELTeRNg
Protocol
H2
Server
2606:4700:20::681a:41e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
78a4346b02b92c1e65040ae8c4212f469808b38462fb15458110f7848f64693c
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://login.accessingfiles.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36

Response headers

date
Sat, 01 Oct 2022 06:24:48 GMT
strict-transport-security
max-age=15552000
x-content-type-options
nosniff
cf-cache-status
MISS
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-disposition
inline; filename="769-300x150.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
last-modified
Sat, 01 Oct 2022 06:24:48 GMT
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5aWtOfiaO6VgnoH%2FnBbWrNB2HtnFAeAC9U2BrIQBVh%2FzLZi0lacewYYvcP8rZANO8uMZUn03mNQ3t%2Fa0TmVaTK3OvkD8akypiqojXIiX6gWwFb988PMEAiJ1At%2FV2PU163VsJ%2Ff5wxoKbb07CA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Picsum-ID
cache-control
public, max-age=2592000
cf-ray
75331e0d0caae688-LHR
picsum-id
769

Redirect headers

date
Sat, 01 Oct 2022 06:24:48 GMT
strict-transport-security
max-age=15552000
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O8iRUDhO3H0htG09umOdvrv5NGGAsBnqjkdSdBeX%2FfoBQ7D3HK6nmFPtTOoFfAELV1cTlrbC%2Fm%2FwN0Es5ehZ4wYQDaeL675jfFrRnPjOFGl0Y0GPBtSqaILbZMDMyh1XIc7ps8XJGFjbQRI%3D"}],"group":"cf-nel","max_age":604800}
location
https://i.picsum.photos/id/769/300/150.jpg?hmac=8Zjo-h0Ws4GxZy84lHvmoEvQBaw8NgojUGRaRWWtOO0
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cf-ray
75331e0c9c70e688-LHR
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
0
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

accept-language
en-GB,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
icon_light.f13cff3.png
cstaticdun.126.net//2.6.3/images/
11 KB
12 KB
Image
General
Full URL
https://cstaticdun.126.net//2.6.3/images/icon_light.f13cff3.png
Requested by
Host: login.accessingfiles.com
URL: https://login.accessingfiles.com/iELTeRNg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
163.181.56.175 Frankfurt am Main, Germany, ASN24429 (TAOBAO Zhejiang Taobao Network Co.,Ltd, CN),
Reverse DNS
Software
Tengine /
Resource Hash
5dc5e0940d0c1e5a92461ca192fd6993bb7d492a04e125d36c7e793c20d1e401

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://login.accessingfiles.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36

Response headers

Date
Sat, 01 Oct 2022 06:24:50 GMT
Via
cache11.l2de2[413,413,304-0,H], cache21.l2de2[414,0], ens-cache7.de4[416,416,200-0,H], ens-cache10.de4[418,0]
Age
0
X-Swift-CacheTime
60
X-Cache
HIT TCP_REFRESH_HIT dirn:10:421528705
Connection
keep-alive
X-Swift-SaveTime
Sat, 01 Oct 2022 06:24:50 GMT
Content-Length
11413
Last-Modified
Wed, 21 Sep 2022 01:35:24 GMT
Server
Tengine
Ali-Swift-Global-Savetime
1664605490
Content-Type
image/png
Access-Control-Allow-Origin
*
Access-Control-Allow-Methods
GET,POST,OPTIONS,HEAD
Access-Control-Expose-Headers
*
Cache-Control
max-age=43200
Accept-Ranges
bytes
Timing-Allow-Origin
*, *
EagleId
2ff62b2216646054896803861e
Expires
Fri, 30 Sep 2022 07:01:05 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| _createClass function| _classCallCheck function| cleanMsg object| jigsaw

1 Cookies

Domain/Path Name / Value
.accessingfiles.com/ Name: oHMB
Value: 1acc402255fe8a2f9ef32c72d30d5804fe47740dfecc68a83caff7cf20c98329

1 Console Messages

Source Level URL
Text
network error URL: https://504054.accessingfiles1.com/hubinternational/#.aHR0cHM6Ly9sb2dpbi5hY2Nlc3NpbmdmaWxlcy5jb20vaUVMVGVSTmcjODY0NjE3MjcyNjU2ZTJlNjM2MTY1NzM2MTcyNDA2ODc1NjI2OTZlNzQ2NTcyNmU2MTc0Njk2ZjZlNjE2YzJlNjM2ZjZk
Message:
Failed to load resource: the server responded with a status of 404 ()