ukaserver.us-south.cf.appdomain.cloud
Open in
urlscan Pro
169.47.124.25
Malicious Activity!
Public Scan
Effective URL: https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=lauren.dana@iff.com
Submission: On October 12 via manual from IN
Summary
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on August 27th 2020. Valid for: a year.
This is the only time ukaserver.us-south.cf.appdomain.cloud was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 169.46.89.154 169.46.89.154 | 36351 (SOFTLAYER) (SOFTLAYER) | |
6 | 169.47.124.25 169.47.124.25 | 36351 (SOFTLAYER) (SOFTLAYER) | |
6 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u16155601.ct.sendgrid.net |
ASN36351 (SOFTLAYER, US)
PTR: 9a.59.2ea9.ip4.static.sl-reverse.com
edo-press.us-south.cf.appdomain.cloud |
ASN36351 (SOFTLAYER, US)
PTR: 19.7c.2fa9.ip4.static.sl-reverse.com
ukaserver.us-south.cf.appdomain.cloud |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
appdomain.cloud
1 redirects
edo-press.us-south.cf.appdomain.cloud ukaserver.us-south.cf.appdomain.cloud |
113 KB |
1 |
sendgrid.net
1 redirects
u16155601.ct.sendgrid.net |
300 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
6 | ukaserver.us-south.cf.appdomain.cloud |
ukaserver.us-south.cf.appdomain.cloud
|
1 | edo-press.us-south.cf.appdomain.cloud | 1 redirects |
1 | u16155601.ct.sendgrid.net | 1 redirects |
6 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.premierpawn.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.us-south.cf.appdomain.cloud DigiCert SHA2 Secure Server CA |
2020-08-27 - 2021-09-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=lauren.dana@iff.com
Frame ID: 12BFF7E7CA2C04F67A1CFE8C37184E27
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u16155601.ct.sendgrid.net/ls/click?upn=A8c8TPcN5tpU3XvHkwU4SV9gO3DGRnLKMTXNksKihhwj-2BeAVJlcyCNT8-2FHE...
HTTP 302
https://edo-press.us-south.cf.appdomain.cloud/index_files/redirectedo/?email=lauren.dana@iff.com HTTP 302
https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=lauren.dana@iff.com Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: SharePoint
Search URL Search Domain Scan URL
Title: DOC Q0017 - 3512C.Doc
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u16155601.ct.sendgrid.net/ls/click?upn=A8c8TPcN5tpU3XvHkwU4SV9gO3DGRnLKMTXNksKihhwj-2BeAVJlcyCNT8-2FHE9gLEilCBS4y3onYdwAqG6xxdEiHKc3HjTy7DAovSvxwq-2BeAVYdviCTtYO4HahIn8qAkb6paUWcPBl9jnPk5-2BYMAR1Fg-3D-3Dnbiu_wNewvRj1qBLLWeLwJUARZl6o-2F29TPNvX9vaQ3Qm0qKQKUpNzWTzHOjQWCSlNp7kqukeQRW4y3gy4Lm0HCcn-2Fhkx7un1vt8-2BnYcCfHXxyLMTb7U4iuwnGElBlYy2M8eZHh2NKn9aNQQyV2yOyowBsCh61bfs6Fch-2F9UUG0zsxSACWa2bryjnBlVHaB8fzSnHwTsA0ENtot0YxGTLthUBS0FM3pXPLUm3s-2B9bStLi2rv4-3D
HTTP 302
https://edo-press.us-south.cf.appdomain.cloud/index_files/redirectedo/?email=lauren.dana@iff.com HTTP 302
https://ukaserver.us-south.cf.appdomain.cloud/tedo/?login=lauren.dana@iff.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ukaserver.us-south.cf.appdomain.cloud/tedo/ Redirect Chain
|
38 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap_002.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
48 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.js.download
ukaserver.us-south.cf.appdomain.cloud/tedo/index_files/ |
50 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery function| Popper object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
edo-press.us-south.cf.appdomain.cloud
u16155601.ct.sendgrid.net
ukaserver.us-south.cf.appdomain.cloud
167.89.123.16
169.46.89.154
169.47.124.25
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
1eb4e34e4146514210476aea4641da8c15e0344336346b727a7a3656b7fa7390
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
5757e602c5502496be5d7ec17d19cd1d97dc216497dfc6a7654f2b6396e546f4
7f672d39017602a1ef5b484477bb7743904515691c3a0242993934d1dd833ece
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b