friovalelog.com.br Open in urlscan Pro
2606:4700:3036::ac43:d8c5  Malicious Activity! Public Scan

Submitted URL: https://projectliteracy.org.za/Direct/?email=dplotkin%40jhancock.com
Effective URL: https://friovalelog.com.br/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=logi...
Submission: On September 01 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3036::ac43:d8c5, located in United States and belongs to CLOUDFLARENET, US. The main domain is friovalelog.com.br.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on August 18th 2020. Valid for: a year.
This is the only time friovalelog.com.br was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 41.185.8.177 36943 (Gridhost)
1 2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
2 friovalelog.com.br
friovalelog.com.br
19 KB
1 projectliteracy.org.za
projectliteracy.org.za
302 B
1 2
Domain Requested by
2 friovalelog.com.br 1 redirects
1 projectliteracy.org.za 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-08-18 -
2021-08-18
a year crt.sh

This page contains 1 frames:

Primary Page: https://friovalelog.com.br/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=ZHBsb3RraW5AamhhbmNvY2suY29t
Frame ID: A2D9E3F756E44AE50A34ACBE3DEF7DC7
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://projectliteracy.org.za/Direct/?email=dplotkin%40jhancock.com HTTP 302
    https://friovalelog.com.br/New/index.php?email=dplotkin@jhancock.com HTTP 302
    https://friovalelog.com.br/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-l... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Page Statistics

1
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

19 kB
Transfer

72 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://projectliteracy.org.za/Direct/?email=dplotkin%40jhancock.com HTTP 302
    https://friovalelog.com.br/New/index.php?email=dplotkin@jhancock.com HTTP 302
    https://friovalelog.com.br/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=ZHBsb3RraW5AamhhbmNvY2suY29t Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request home.php
friovalelog.com.br/New/
Redirect Chain
  • https://projectliteracy.org.za/Direct/?email=dplotkin%40jhancock.com
  • https://friovalelog.com.br/New/index.php?email=dplotkin@jhancock.com
  • https://friovalelog.com.br/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=ZHBsb3RraW5AamhhbmNvY2suY29t
41 KB
19 KB
Document
General
Full URL
https://friovalelog.com.br/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=ZHBsb3RraW5AamhhbmNvY2suY29t
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::ac43:d8c5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PHP/7.0.33 PleskLin
Resource Hash
efd66c42161f45365817922b9f2fecbb6003e518173ae12525dde2f4e28b516c

Request headers

:method
GET
:authority
friovalelog.com.br
:scheme
https
:path
/New/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=ZHBsb3RraW5AamhhbmNvY2suY29t
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
__cfduid=ddca0887174e5bf4a0179e5f36e042e0c1598945679; PHPSESSID=jck10oa8d923s0k8i2l2k1ru15
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Tue, 01 Sep 2020 07:34:41 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.0.33 PleskLin
cf-cache-status
DYNAMIC
cf-request-id
04ea2ff2530000d725f2823200000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5cbd4f63bfd0d725-FRA
content-encoding
br

Redirect headers

status
302
date
Tue, 01 Sep 2020 07:34:39 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=ddca0887174e5bf4a0179e5f36e042e0c1598945679; expires=Thu, 01-Oct-20 07:34:39 GMT; path=/; domain=.friovalelog.com.br; HttpOnly; SameSite=Lax PHPSESSID=jck10oa8d923s0k8i2l2k1ru15; path=/
x-powered-by
PHP/7.0.33 PleskLin
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
location
home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=ZHBsb3RraW5AamhhbmNvY2suY29t
cf-cache-status
DYNAMIC
cf-request-id
04ea2feec40000d725f2bee200000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5cbd4f5e09aed725-FRA
truncated
/
20 KB
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
379765ab31aed2e0d3cdef473f0c2a3f0ee46391724fc7a8024e901c261cdcba

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
text/css
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes

0 Cookies