mails-onlinestatus-inbox.net
Open in
urlscan Pro
104.21.23.106
Malicious Activity!
Public Scan
Effective URL: https://mails-onlinestatus-inbox.net/action/Login.php
Submission Tags: @ecarlesi threat #phishing #ausgov Search All
Submission: On August 27 via api from CA — Scanned from CA
Summary
TLS certificate: Issued by GTS CA 1P5 on August 27th 2023. Valid for: 3 months.
This is the only time mails-onlinestatus-inbox.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 12 | 104.21.23.106 104.21.23.106 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.217.13.138 172.217.13.138 | 15169 (GOOGLE) (GOOGLE) | |
1 | 69.16.175.10 69.16.175.10 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
2 | 172.217.13.163 172.217.13.163 | 15169 (GOOGLE) (GOOGLE) | |
15 | 4 |
ASN15169 (GOOGLE, US)
PTR: yul02s05-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: yul03s04-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
mails-onlinestatus-inbox.net
1 redirects
mails-onlinestatus-inbox.net |
199 KB |
2 |
gstatic.com
fonts.gstatic.com |
31 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 736 |
82 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 45 |
1 KB |
15 | 4 |
Domain | Requested by | |
---|---|---|
12 | mails-onlinestatus-inbox.net |
1 redirects
mails-onlinestatus-inbox.net
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | code.jquery.com |
mails-onlinestatus-inbox.net
|
1 | fonts.googleapis.com |
mails-onlinestatus-inbox.net
|
15 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
my.gov.au |
www.digitalidentity.gov.au |
www.mygovid.gov.au |
Subject Issuer | Validity | Valid | |
---|---|---|---|
mails-onlinestatus-inbox.net GTS CA 1P5 |
2023-08-27 - 2023-11-25 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mails-onlinestatus-inbox.net/action/Login.php
Frame ID: 681C94DA3705F1A5069D69D37418D2CC
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Sign in with myGov - myGovPage URL History Show full URLs
-
https://mails-onlinestatus-inbox.net/
HTTP 302
https://mails-onlinestatus-inbox.net/action/Login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
8 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Title: Digital Identity
Search URL Search Domain Scan URL
Title: myGovID
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy and security
Search URL Search Domain Scan URL
Title: Copyright
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mails-onlinestatus-inbox.net/
HTTP 302
https://mails-onlinestatus-inbox.net/action/Login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Login.php
mails-onlinestatus-inbox.net/action/ Redirect Chain
|
9 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
16 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
mgv2-application.css
mails-onlinestatus-inbox.net/files/css/ |
125 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blugov.css
mails-onlinestatus-inbox.net/files/css/ |
79 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
page.css
mails-onlinestatus-inbox.net/files/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.7.0.js
code.jquery.com/ |
278 KB 82 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.js
mails-onlinestatus-inbox.net/files/js/ |
266 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
clientStatus.js
mails-onlinestatus-inbox.net/files/js/ |
397 B 695 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
myGov-cobranded-logo-black.svg
mails-onlinestatus-inbox.net/files/img/ |
63 KB 21 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
login.js
mails-onlinestatus-inbox.net/files/js/ |
727 B 808 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
myGov-cobranded-logo-white.svg
mails-onlinestatus-inbox.net/files/img/ |
63 KB 21 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Lucida%20Sans.ttf
mails-onlinestatus-inbox.net/files/fonts/ |
57 KB 39 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
action.php
mails-onlinestatus-inbox.net/files/incl/ |
0 512 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery number| interval function| heartbeat1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mails-onlinestatus-inbox.net/ | Name: PHPSESSID Value: vj6arvocrnlguhmti71qauav2u |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | sameorigin |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
mails-onlinestatus-inbox.net
104.21.23.106
172.217.13.138
172.217.13.163
69.16.175.10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