icomosga2020.org Open in urlscan Pro
203.26.196.188  Malicious Activity! Public Scan

URL: http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Submission: On October 16 via manual

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 7 HTTP transactions. The main IP is 203.26.196.188, located in Sydney, Australia and belongs to . The main domain is icomosga2020.org.
This is the only time icomosga2020.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
3 203.26.196.188 ()
1 192.229.133.221 15133 (EDGECAST)
1 2a00:1450:400... 15169 (GOOGLE)
7 4
Apex Domain
Subdomains
Transfer
3 icomosga2020.org
icomosga2020.org
4 KB
1 google.com
www.google.com
809 B
1 w3schools.com
www.w3schools.com
5 KB
0 web.de Failed
mail.web.de Failed
7 4
Domain Requested by
3 icomosga2020.org icomosga2020.org
1 www.google.com icomosga2020.org
1 www.w3schools.com icomosga2020.org
0 mail.web.de Failed icomosga2020.org
7 4

This site contains no links.

Subject Issuer Validity Valid
*.w3schools.com
DigiCert SHA2 Secure Server CA
2017-10-25 -
2020-05-05
3 years crt.sh
www.google.com
GTS CA 1O1
2019-09-17 -
2019-12-10
3 months crt.sh

This page contains 2 frames:

Primary Page: http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Frame ID: 92AEB5C82BBD0B72BF4476640A2A90D4
Requests: 5 HTTP requests in this frame

Frame: https://mail.web.de/
Frame ID: FEEC49BCCE840C668E0A07D25118D69E
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

7
Requests

29 %
HTTPS

33 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

10 kB
Transfer

29 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 4
  • http://mail.web.de/ HTTP 307
  • https://mail.web.de/

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request error.php
icomosga2020.org/MailSessionExpired/unique/page/
2 KB
1 KB
Document
General
Full URL
http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Protocol
HTTP/1.1
Server
203.26.196.188 Sydney, Australia, ASN (),
Reverse DNS
gi1-1.sau-c1cbb-fw.servercontrol.com.au
Software
Apache / PHP/7.2.23
Resource Hash
f6487a2dc2f0a7793123360109697832fa02f652b3a5a14802dd7c7bb1119dd4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
icomosga2020.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 07:49:30 GMT
Server
Apache
X-Powered-By
PHP/7.2.23
X-Frame-Options
SAMEORIGIN
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Length
955
Keep-Alive
timeout=5, max=100
Content-Type
text/html; charset=UTF-8
w3.css
www.w3schools.com/w3css/4/
23 KB
5 KB
Stylesheet
General
Full URL
https://www.w3schools.com/w3css/4/w3.css
Requested by
Host: icomosga2020.org
URL: http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.229.133.221 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) / ASP.NET
Resource Hash
dd30cb28b7ad3a268bd4a6a5730f42e65490abd49bd2cf8a436afbbec5aceb02
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 07:49:31 GMT
content-encoding
gzip
etag
"0386ec7c1dd51:0"
last-modified
Fri, 07 Jun 2019 08:41:20 GMT
server
ECS (fcn/418F)
x-powered-by
ASP.NET
x-frame-options
SAMEORIGIN
x-cache
HIT
content-type
text/css
status
200
cache-control
public,max-age=14400,public
accept-ranges
bytes
vary
Accept-Encoding
content-length
5224
design.css
icomosga2020.org/MailSessionExpired/unique/page/assets/css/
330 B
595 B
Stylesheet
General
Full URL
http://icomosga2020.org/MailSessionExpired/unique/page/assets/css/design.css
Requested by
Host: icomosga2020.org
URL: http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Protocol
HTTP/1.1
Server
203.26.196.188 Sydney, Australia, ASN (),
Reverse DNS
gi1-1.sau-c1cbb-fw.servercontrol.com.au
Software
Apache /
Resource Hash
8a1666209ffc8b3e5398352fe43683713e97960b4fba25049726cc49fec486e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 07:49:30 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Thu, 28 Mar 2019 06:13:16 GMT
Server
Apache
X-Frame-Options
SAMEORIGIN
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Vary
Accept-Encoding,User-Agent
Content-Length
202
X-XSS-Protection
1; mode=block
Keep-Alive
timeout=5, max=99
validate.js
icomosga2020.org/MailSessionExpired/unique/page/assets/js/
3 KB
2 KB
Script
General
Full URL
http://icomosga2020.org/MailSessionExpired/unique/page/assets/js/validate.js
Requested by
Host: icomosga2020.org
URL: http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Protocol
HTTP/1.1
Server
203.26.196.188 Sydney, Australia, ASN (),
Reverse DNS
gi1-1.sau-c1cbb-fw.servercontrol.com.au
Software
Apache /
Resource Hash
d35a1ab30d065cb8a0a0274c1b8a8b6140685228f14da41e53d7cfb4782ab531
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 07:49:30 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Thu, 28 Mar 2019 06:13:16 GMT
Server
Apache
X-Frame-Options
SAMEORIGIN
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Vary
Accept-Encoding,User-Agent
Content-Length
1514
X-XSS-Protection
1; mode=block
Keep-Alive
timeout=5, max=100
error.php
icomosga2020.org/MailSessionExpired/unique/page/ Frame FEEC
0
0

/
mail.web.de/ Frame FEEC
Redirect Chain
  • http://mail.web.de/
  • https://mail.web.de/
0
0

favicons
www.google.com/s2/
595 B
809 B
Image
General
Full URL
https://www.google.com/s2/favicons?domain=web.de
Requested by
Host: icomosga2020.org
URL: http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
f1bd758fe6b893df05cd3f9f5799dd861efe235ac12e0b1fad07a9687ab22761
Security Headers
Name Value
Content-Security-Policy script-src 'unsafe-inline' https: http:;object-src 'none';base-uri 'self';report-uri /_/FaviconHttp/cspreport;worker-src 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 15 Oct 2019 08:49:39 GMT
x-content-type-options
nosniff
server
ESF
age
82791
x-frame-options
SAMEORIGIN
content-type
image/png
status
200
cache-control
public, max-age=86400
content-security-policy
script-src 'unsafe-inline' https: http:;object-src 'none';base-uri 'self';report-uri /_/FaviconHttp/cspreport;worker-src 'self'
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
595
x-xss-protection
0
expires
Wed, 16 Oct 2019 08:49:39 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
icomosga2020.org
URL
http://icomosga2020.org/MailSessionExpired/unique/page/error.php?access=hans.napf@web.de
Domain
mail.web.de
URL
https://mail.web.de/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

18 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| getUrlVars string| email string| domain string| provider string| locateFav string| aol string| cn21 string| yandex string| yahoo string| a163 string| sina string| mailru string| office string| godaddy string| gmail string| locate

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block