esrezrzer.afterwork.ae.org
Open in
urlscan Pro
135.181.153.53
Malicious Activity!
Public Scan
Effective URL: https://esrezrzer.afterwork.ae.org/?_kx=Vr1yTEO90w-MAD1HefwlPA.WzS7tx
Submission: On May 22 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by centos-8gb-hel1-1 on October 4th 2023. Valid for: a year.
This is the only time esrezrzer.afterwork.ae.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2600:9000:26d... 2600:9000:26db:e800:9:ec94:b800:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 135.181.153.53 135.181.153.53 | 24940 (HETZNER-AS) (HETZNER-AS) | |
3 | 1 |
ASN24940 (HETZNER-AS, DE)
PTR: static.53.153.181.135.clients.your-server.de
esrezrzer.afterwork.ae.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
ae.org
esrezrzer.afterwork.ae.org |
2 KB |
1 |
klclick3.com
1 redirects
trk.klclick3.com — Cisco Umbrella Rank: 37841 |
309 B |
3 | 2 |
Domain | Requested by | |
---|---|---|
3 | esrezrzer.afterwork.ae.org |
esrezrzer.afterwork.ae.org
|
1 | trk.klclick3.com | 1 redirects |
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
centos-8gb-hel1-1 centos-8gb-hel1-1 |
2023-10-04 - 2024-10-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://esrezrzer.afterwork.ae.org/?_kx=Vr1yTEO90w-MAD1HefwlPA.WzS7tx
Frame ID: 00B5C49DBEA27145836FFE18901CDAF3
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
Index of /Page URL History Show full URLs
-
https://trk.klclick3.com/ls/click?upn=u001.G-2BGDroRoJX-2BtuWV1zwoRGq6f9I0jYwfX3yl8UDIjdf6KCprOsYxN7S...
HTTP 302
http://esrezrzer.afterwork.ae.org/?_kx=Vr1yTEO90w-MAD1HefwlPA.WzS7tx HTTP 307
https://esrezrzer.afterwork.ae.org/?_kx=Vr1yTEO90w-MAD1HefwlPA.WzS7tx Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://trk.klclick3.com/ls/click?upn=u001.G-2BGDroRoJX-2BtuWV1zwoRGq6f9I0jYwfX3yl8UDIjdf6KCprOsYxN7SWfUOHBy2ksf1IsHXMoFoa-2BMsozaVdfd6EoQWHXPcEvsgGKEsyAsvM-3D9gRH_XI-2B2blcTqolg85nQWNumLrqsMmci-2BQP4ZAJm5Ms-2FGaB3MHK1Myw26p-2FRHBkKt-2BSg3rO9-2FABVRD1SPERTugQx0CouCT4bAX5HT5W18s37OF4-2Bb33Bgo5Xe6HRVwC-2FWobE1arnYoYkVOyVJi2Jy-2B8kS3ik5JCcAjVSpTR2VibFGaHuCutxeAkMPio8AA8qyAZRpkiL4cvpD9jinIlrYUHijOJZICNv02n0zmWKfVR0M6Sc2ayZaw8bxB86q9ZOdbLnuNzU1UsEFWw-2FEiCdjAYlNp-2Fnjn5EGOprrGundioxFCrS-2BbHsYDlFLcpFTvC-2FIppi
HTTP 302
http://esrezrzer.afterwork.ae.org/?_kx=Vr1yTEO90w-MAD1HefwlPA.WzS7tx HTTP 307
https://esrezrzer.afterwork.ae.org/?_kx=Vr1yTEO90w-MAD1HefwlPA.WzS7tx Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
esrezrzer.afterwork.ae.org/ Redirect Chain
|
481 B 720 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blank.gif
esrezrzer.afterwork.ae.org/icons/ |
148 B 461 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
esrezrzer.afterwork.ae.org/ |
209 B 455 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
May 22nd 2024, 8:15:43 pm
UTC —
From United States
Threats:
Brand Impersonation
Brands:
Xfinity
US
Comment: sending email spam to comcast customers
X-Authority-Analysis: v=2.4 cv=Gpjh+V1C c=1 sm=1 tr=0 ts=664e5001
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
esrezrzer.afterwork.ae.org
trk.klclick3.com
135.181.153.53
2600:9000:26db:e800:9:ec94:b800:93a1
3cb0e54babf019703fe671a32fcc3947aab9079ec2871cf0f9639245cc12d878
b0893b6c9225a4291ffc5cd7164a96304aed135dfd40763b4fedc970bf0abe3d
b6682cab65d3243b5b75efb7279dbf49491957484780f2ba0a87632cc0e25642