absolutemma.online Open in urlscan Pro
103.20.202.161  Malicious Activity! Public Scan

Submitted URL: https://aarondavidpolley.com/zakariaa7Xmifdalq0Hframatr7Pm9yWa7XB8xr7Pm
Effective URL: https://absolutemma.online/auth/logon.php
Submission: On April 14 via manual from FR — Scanned from AU

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 103.20.202.161, located in Australia and belongs to DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU. The main domain is absolutemma.online.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on September 18th 2022. Valid for: a year.
This is the only time absolutemma.online was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
2 3 103.20.202.161 38719 (DREAMSCAP...)
1 65.9.181.44 16509 (AMAZON-02)
3 3
Apex Domain
Subdomains
Transfer
2 absolutemma.online
absolutemma.online
www.absolutemma.online Failed
22 KB
1 clearbit.com
logo.clearbit.com — Cisco Umbrella Rank: 21466
6 KB
1 aarondavidpolley.com
aarondavidpolley.com
199 B
3 3
Domain Requested by
2 absolutemma.online 1 redirects
1 logo.clearbit.com absolutemma.online
1 aarondavidpolley.com 1 redirects
0 www.absolutemma.online Failed absolutemma.online
3 4

This site contains no links.

Subject Issuer Validity Valid
absolutemma.online
Sectigo RSA Domain Validation Secure Server CA
2022-09-18 -
2023-10-19
a year crt.sh
clearbit.com
Amazon RSA 2048 M02
2023-02-21 -
2024-03-21
a year crt.sh

This page contains 1 frames:

Primary Page: https://absolutemma.online/auth/logon.php
Frame ID: 92619CF286B941578D935699189187CE
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

Outlook

Page URL History Show full URLs

  1. https://aarondavidpolley.com/zakariaa7Xmifdalq0Hframatr7Pm9yWa7XB8xr7Pm HTTP 302
    https://absolutemma.online/auth/?client-request-id=emFrYXJpYS5taWZkYWxAZnJhbWF0b21lLmNvbQ== HTTP 302
    https://absolutemma.online/auth/logon.php Page URL

Page Statistics

3
Requests

67 %
HTTPS

0 %
IPv6

3
Domains

4
Subdomains

3
IPs

2
Countries

28 kB
Transfer

59 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://aarondavidpolley.com/zakariaa7Xmifdalq0Hframatr7Pm9yWa7XB8xr7Pm HTTP 302
    https://absolutemma.online/auth/?client-request-id=emFrYXJpYS5taWZkYWxAZnJhbWF0b21lLmNvbQ== HTTP 302
    https://absolutemma.online/auth/logon.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 5
  • https://absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf HTTP 301
  • https://www.absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request logon.php
absolutemma.online/auth/
Redirect Chain
  • https://aarondavidpolley.com/zakariaa7Xmifdalq0Hframatr7Pm9yWa7XB8xr7Pm
  • https://absolutemma.online/auth/?client-request-id=emFrYXJpYS5taWZkYWxAZnJhbWF0b21lLmNvbQ==
  • https://absolutemma.online/auth/logon.php
44 KB
22 KB
Document
General
Full URL
https://absolutemma.online/auth/logon.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
103.20.202.161 , Australia, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
server-4h-r67.ipv4.syd02.ds.network
Software
nginx / PHP/7.3.33
Resource Hash
2030dfd733bd718fad2d7ebb9fc34d5ca8ba8d1a6aff68cadfba52461ff41e05

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Fri, 14 Apr 2023 13:46:34 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
server
nginx
vary
Accept-Encoding
x-powered-by
PHP/7.3.33

Redirect headers

cache-control
no-store, no-cache, must-revalidate
content-length
0
content-type
text/html; charset=UTF-8
date
Fri, 14 Apr 2023 13:46:34 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
logon.php
pragma
no-cache
server
nginx
x-powered-by
PHP/7.3.33
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

accept-language
en-AU,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

accept-language
en-AU,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/png
framatome.com
logo.clearbit.com/
6 KB
6 KB
Image
General
Full URL
https://logo.clearbit.com/framatome.com
Requested by
Host: absolutemma.online
URL: https://absolutemma.online/auth/logon.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.181.44 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-65-9-181-44.bkk50.r.cloudfront.net
Software
envoy /
Resource Hash
15c72b85e2615f19fbb9c13903e70d17ad7de32a68811d959c1486cc7ff059b0
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://absolutemma.online/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

date
Mon, 10 Apr 2023 01:25:12 GMT
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-content-type-options
nosniff
x-envoy-response-flags
-
via
1.1 06bd866aa9a243874a68ae5c443c25c2.cloudfront.net (CloudFront)
server
envoy
x-amz-cf-pop
BKK50-C2
age
390083
x-cache
Hit from cloudfront
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2592000
x-amz-cf-id
0j_tV8D-sob4rwmtTRxlgedR2wMTrbhxPuYra0S9ov9YWI5yC0TEHA==
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

accept-language
en-AU,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

accept-language
en-AU,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/png
segoeui-regular.ttf
www.absolutemma.online/owa/auth/15.1.2106/themes/resources/
Redirect Chain
  • https://absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf
  • https://www.absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.absolutemma.online
URL
https://www.absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

23 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| initLogon function| redir function| shw function| hd function| clkSecExp function| kdSecExp function| clkSec function| clkBsc function| checkSubmit function| clkLgn function| clkRtry function| clkReLgn function| gbid function| IsOwaPremiumBrowser function| hres function| LogoffMime function| addPerfMarker object| mainLogonDiv boolean| showPlaceholderText string| mainLogonDivClassName function| setPlaceholderText function| showPasswordClick

1 Cookies

Domain/Path Name / Value
absolutemma.online/ Name: PHPSESSID
Value: e178de397b8d4b904e3d612c6e2ddd0a

2 Console Messages

Source Level URL
Text
javascript error URL: https://absolutemma.online/auth/logon.php#replaceCurrent=1&url=http%3A%2F%2Fmail.framatome.com%2Fowa%2F
Message:
Access to font at 'https://www.absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf' (redirected from 'https://absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf') from origin 'https://absolutemma.online' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://www.absolutemma.online/owa/auth/15.1.2106/themes/resources/segoeui-regular.ttf
Message:
Failed to load resource: net::ERR_FAILED