pub-2a64f782845943beae62e9f09c473700.r2.dev Open in urlscan Pro
2606:4700::6812:323  Malicious Activity! Public Scan

Submitted URL: http://inail.784.buregkhangai.mn/#a.terracina%40inail.it
Effective URL: https://pub-2a64f782845943beae62e9f09c473700.r2.dev/80VA.html
Submission Tags: falconsandbox
Submission: On November 06 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 1 countries across 2 domains to perform 2 HTTP transactions. The main IP is 2606:4700::6812:323, located in United States and belongs to CLOUDFLARENET, US. The main domain is pub-2a64f782845943beae62e9f09c473700.r2.dev.
TLS certificate: Issued by E1 on October 11th 2023. Valid for: 3 months.
This is the only time pub-2a64f782845943beae62e9f09c473700.r2.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 198.54.126.47 22612 (NAMECHEAP...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 3
Domain Requested by
1 pub-2a64f782845943beae62e9f09c473700.r2.dev inail.784.buregkhangai.mn
1 inail.784.buregkhangai.mn
2 2

This site contains no links.

Subject Issuer Validity Valid
*.r2.dev
E1
2023-10-11 -
2024-01-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://pub-2a64f782845943beae62e9f09c473700.r2.dev/80VA.html
Frame ID: 516790DB4911B99248F3BA150976C332
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Outlook

Page URL History Show full URLs

  1. http://inail.784.buregkhangai.mn/ Page URL
  2. https://pub-2a64f782845943beae62e9f09c473700.r2.dev/80VA.html Page URL

Page Statistics

2
Requests

50 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

1
Countries

27 kB
Transfer

154 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://inail.784.buregkhangai.mn/ Page URL
  2. https://pub-2a64f782845943beae62e9f09c473700.r2.dev/80VA.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
inail.784.buregkhangai.mn/
783 B
566 B
Document
General
Full URL
http://inail.784.buregkhangai.mn/
Protocol
HTTP/1.1
Server
198.54.126.47 , United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
host14-3.registrar-servers.com
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
none
content-encoding
gzip
content-length
334
content-type
text/html
date
Mon, 06 Nov 2023 15:07:23 GMT
last-modified
Mon, 06 Nov 2023 13:54:03 GMT
server
Apache
vary
Accept-Encoding
Primary Request 80VA.html
pub-2a64f782845943beae62e9f09c473700.r2.dev/
122 KB
26 KB
Document
General
Full URL
https://pub-2a64f782845943beae62e9f09c473700.r2.dev/80VA.html
Requested by
Host: inail.784.buregkhangai.mn
URL: http://inail.784.buregkhangai.mn/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:323 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a552d1315f74ecb81d26796c2c8114b668fba06e07ce8a4b6583343eeeea64c6

Request headers

Referer
http://inail.784.buregkhangai.mn/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

CF-RAY
821e3ef01f7b92b7-FRA
Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html
Date
Mon, 06 Nov 2023 15:07:23 GMT
ETag
W/"212b32262a3f45c430cccdb792d022f7"
Last-Modified
Mon, 06 Nov 2023 10:21:43 GMT
Server
cloudflare
Transfer-Encoding
chunked
Vary
Accept-Encoding
truncated
/
20 KB
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
379765ab31aed2e0d3cdef473f0c2a3f0ee46391724fc7a8024e901c261cdcba

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

Content-Type
text/css
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies