phishing.wspprobe.allot.com Open in urlscan Pro
2a05:d014:f4c:ae10:3a47:38cd:e61f:969c  Public Scan

Submitted URL: http://phishing.wspprobe.allot.com/
Effective URL: https://phishing.wspprobe.allot.com/
Submission: On June 25 via api from GB — Scanned from GB

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 2a05:d014:f4c:ae10:3a47:38cd:e61f:969c, located in Frankfurt am Main, Germany and belongs to AMAZON-02, US. The main domain is phishing.wspprobe.allot.com.
TLS certificate: Issued by R3 on May 18th 2024. Valid for: 3 months.
This is the only time phishing.wspprobe.allot.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 2a05:d014:f4c... 16509 (AMAZON-02)
3 1
Apex Domain
Subdomains
Transfer
3 allot.com
phishing.wspprobe.allot.com
8 KB
3 1
Domain Requested by
3 phishing.wspprobe.allot.com phishing.wspprobe.allot.com
3 1

This site contains no links.

Subject Issuer Validity Valid
phishing.wspprobe.allot.com
R3
2024-05-18 -
2024-08-16
3 months crt.sh

This page contains 1 frames:

Primary Page: https://phishing.wspprobe.allot.com/
Frame ID: FD5B53AE490F3AC6F3F8B2C7EAA1C258
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Allot WSP Probe Server - phishing

Page URL History Show full URLs

  1. http://phishing.wspprobe.allot.com/ HTTP 307
    https://phishing.wspprobe.allot.com/ Page URL

Page Statistics

3
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

8 kB
Transfer

7 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://phishing.wspprobe.allot.com/ HTTP 307
    https://phishing.wspprobe.allot.com/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
phishing.wspprobe.allot.com/
Redirect Chain
  • http://phishing.wspprobe.allot.com/
  • https://phishing.wspprobe.allot.com/
421 B
520 B
Document
General
Full URL
https://phishing.wspprobe.allot.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:d014:f4c:ae10:3a47:38cd:e61f:969c Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
e11f9c4362dedee2222519f64d128a4ae7031a6b835a5b763005a1c224cc0696

Request headers

Accept-Language
en-GB,en;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Encoding
gzip
Content-Length
268
Content-Type
text/html; charset=UTF-8
Date
Tue, 25 Jun 2024 23:58:58 GMT
Keep-Alive
timeout=5, max=100
Server
Apache/2.4.18 (Ubuntu)
Vary
Accept-Encoding

Redirect headers

Location
https://phishing.wspprobe.allot.com/
Non-Authoritative-Reason
HttpsUpgrades
allotlogo.png
phishing.wspprobe.allot.com/
6 KB
7 KB
Image
General
Full URL
https://phishing.wspprobe.allot.com/allotlogo.png
Requested by
Host: phishing.wspprobe.allot.com
URL: https://phishing.wspprobe.allot.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:d014:f4c:ae10:3a47:38cd:e61f:969c Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
4df67683649b002738db1fdd095d51794a50aa441813ed025bffe1d0218830ff

Request headers

sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
Referer
https://phishing.wspprobe.allot.com/
Accept-Language
en-GB,en;q=0.9;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

Date
Tue, 25 Jun 2024 23:58:58 GMT
Last-Modified
Tue, 16 Jan 2018 12:39:47 GMT
Server
Apache/2.4.18 (Ubuntu)
ETag
"1981-562e406a4d6e7"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
6529
favicon.ico
phishing.wspprobe.allot.com/
290 B
506 B
Other
General
Full URL
https://phishing.wspprobe.allot.com/favicon.ico
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:d014:f4c:ae10:3a47:38cd:e61f:969c Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
baaf19dec4466d9fa4e3f167397d9f56ba77a43f716512afeddd3468a8beecf0

Request headers

sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
Referer
https://phishing.wspprobe.allot.com/
Accept-Language
en-GB,en;q=0.9;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

Date
Tue, 25 Jun 2024 23:58:58 GMT
Server
Apache/2.4.18 (Ubuntu)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=98
Content-Length
290
Content-Type
text/html; charset=iso-8859-1

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence object| sharedStorage

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://phishing.wspprobe.allot.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

phishing.wspprobe.allot.com
2a05:d014:f4c:ae10:3a47:38cd:e61f:969c
4df67683649b002738db1fdd095d51794a50aa441813ed025bffe1d0218830ff
baaf19dec4466d9fa4e3f167397d9f56ba77a43f716512afeddd3468a8beecf0
e11f9c4362dedee2222519f64d128a4ae7031a6b835a5b763005a1c224cc0696