ukaserver.us-south.cf.appdomain.cloud
Open in
urlscan Pro
169.47.124.25
Malicious Activity!
Public Scan
Effective URL: https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=basile.devedjian@vega-im.com
Submission: On October 12 via manual from FR
Summary
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on August 27th 2020. Valid for: a year.
This is the only time ukaserver.us-south.cf.appdomain.cloud was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.115.54 167.89.115.54 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 169.46.89.154 169.46.89.154 | 36351 (SOFTLAYER) (SOFTLAYER) | |
6 | 169.47.124.25 169.47.124.25 | 36351 (SOFTLAYER) (SOFTLAYER) | |
6 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789115x54.outbound-mail.sendgrid.net
u16155601.ct.sendgrid.net |
ASN36351 (SOFTLAYER, US)
PTR: 9a.59.2ea9.ip4.static.sl-reverse.com
edo-press.us-south.cf.appdomain.cloud |
ASN36351 (SOFTLAYER, US)
PTR: 19.7c.2fa9.ip4.static.sl-reverse.com
ukaserver.us-south.cf.appdomain.cloud |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
appdomain.cloud
1 redirects
edo-press.us-south.cf.appdomain.cloud ukaserver.us-south.cf.appdomain.cloud |
113 KB |
1 |
sendgrid.net
1 redirects
u16155601.ct.sendgrid.net |
309 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
6 | ukaserver.us-south.cf.appdomain.cloud |
ukaserver.us-south.cf.appdomain.cloud
|
1 | edo-press.us-south.cf.appdomain.cloud | 1 redirects |
1 | u16155601.ct.sendgrid.net | 1 redirects |
6 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.premierpawn.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.us-south.cf.appdomain.cloud DigiCert SHA2 Secure Server CA |
2020-08-27 - 2021-09-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=basile.devedjian@vega-im.com
Frame ID: 4794CB8E93D733C0DD07074AA96E9C22
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u16155601.ct.sendgrid.net/ls/click?upn=A8c8TPcN5tpU3XvHkwU4SV9gO3DGRnLKMTXNksKihhwj-2BeAVJlcyCNT8-2FHE...
HTTP 302
https://edo-press.us-south.cf.appdomain.cloud/index_files/redirectedo/?email=basile.devedjian@vega-im.com HTTP 302
https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=basile.devedjian@vega-im.com Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: SharePoint
Search URL Search Domain Scan URL
Title: DOC Q0017 - 3512C.Doc
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u16155601.ct.sendgrid.net/ls/click?upn=A8c8TPcN5tpU3XvHkwU4SV9gO3DGRnLKMTXNksKihhwj-2BeAVJlcyCNT8-2FHE9gLEilCBS4y3onYdwAqG6xxdEiHKc3HjTy7DAovSvxwq-2BeAVUan5dwsX8M7XO8rtNAx5WxQaRvgaeUHjUNxOXuRSELUPPDOQNKTmFDMONq1F73PI-3D2SFi_EKH3ScUE2-2BOl3hsnLYTw9Ga6hsGcGgHQuL5LKqzA5beuOUy8uvEVCq9-2FHcr1bQJm4aMCvdZgGagPzbCBdmiuASBJwqAT2HJ3BSdpluqqLMONu3-2Fpym6Qkhjh1N-2BQybGrXJO1ahjBLmP6ELBXQtiekCinakNbE2HH4nAzgvKuNIHdacNQQN0FHYBkzS2gxWEOL-2FxiD1bbNLwGyXGIzM5e8aGso7K3Wo8Wl6W2-2FnFSCho-3D
HTTP 302
https://edo-press.us-south.cf.appdomain.cloud/index_files/redirectedo/?email=basile.devedjian@vega-im.com HTTP 302
https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=basile.devedjian@vega-im.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ukaserver.us-south.cf.appdomain.cloud/tedo/ Redirect Chain
|
38 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap_002.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
48 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
50 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery function| Popper object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
edo-press.us-south.cf.appdomain.cloud
u16155601.ct.sendgrid.net
ukaserver.us-south.cf.appdomain.cloud
167.89.115.54
169.46.89.154
169.47.124.25
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
3a65c1ccdf97375627832c0159baed02cfb4796e65e81339d19b8c457ea0cb55
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
5757e602c5502496be5d7ec17d19cd1d97dc216497dfc6a7654f2b6396e546f4
7f672d39017602a1ef5b484477bb7743904515691c3a0242993934d1dd833ece
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b