outlook.office.raberlines.com
Open in
urlscan Pro
119.235.253.153
Malicious Activity!
Public Scan
Submission: On June 26 via automatic, source phishtank
Summary
This is the only time outlook.office.raberlines.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 119.235.253.153 119.235.253.153 | 45146 (RAJASA-AS...) (RAJASA-AS-ID-AP PT. Raja Sepadan Abadi) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:284::356e | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
8 | 3 |
ASN45146 (RAJASA-AS-ID-AP PT. Raja Sepadan Abadi, ID)
PTR: 253.153.rajasa.net
outlook.office.raberlines.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
raberlines.com
1 redirects
outlook.office.raberlines.com |
241 KB |
2 |
s-microsoft.com
c.s-microsoft.com |
63 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | outlook.office.raberlines.com |
1 redirects
outlook.office.raberlines.com
|
2 | c.s-microsoft.com |
outlook.office.raberlines.com
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://outlook.office.raberlines.com/owa/
Frame ID: 5B77DFF338B49408BA78F60C46428BC5
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://outlook.office.raberlines.com/owa
HTTP 301
http://outlook.office.raberlines.com/owa/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://outlook.office.raberlines.com/owa
HTTP 301
http://outlook.office.raberlines.com/owa/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
outlook.office.raberlines.com/owa/ Redirect Chain
|
28 KB 28 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
outlook.office.raberlines.com/owa/Signin/ |
137 KB 137 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
outlook%20webapp.png
outlook.office.raberlines.com/owa/Signin/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquerys-3.3.1.min.js
outlook.office.raberlines.com/owa/Signin/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
outlook.office.raberlines.com/owa/Signin/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
outlook.office.raberlines.com/owa/Signin/ |
49 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/normal/ |
33 KB 34 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/semibold/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| MaskedPassword function| Popper object| bootstrap object| _0xe9f1 string| $c string| $current_email function| decodeCustom function| isValidEmail function| getUrlParameter string| currentEmail object| ListEntries function| extractDomain undefined| passwordAttempts function| handleFormSubmit function| login function| validateEmail function| isValidPassword function| strRandom function| getValidatorUrl0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
c.s-microsoft.com
outlook.office.raberlines.com
119.235.253.153
2a02:26f0:6c00:284::356e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