wm.mail.isx.net.nz
Open in
urlscan Pro
111.65.230.83
Malicious Activity!
Public Scan
Effective URL: https://wm.mail.isx.net.nz/
Submission: On November 20 via api from US — Scanned from NZ
Summary
TLS certificate: Issued by RapidSSL Global TLS RSA4096 SHA256 20... on December 16th 2022. Valid for: a year.
This is the only time wm.mail.isx.net.nz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 111.65.230.88 111.65.230.88 | 56030 (VOYAGERNE...) (VOYAGERNET-AS-AP Voyager Internet Ltd.) | |
7 | 111.65.230.83 111.65.230.83 | 56030 (VOYAGERNE...) (VOYAGERNET-AS-AP Voyager Internet Ltd.) | |
7 | 1 |
ASN56030 (VOYAGERNET-AS-AP Voyager Internet Ltd., NZ)
webmail.wtttm.maori.nz |
ASN56030 (VOYAGERNET-AS-AP Voyager Internet Ltd., NZ)
PTR: proxyvip2.mail.isx.net.nz
wm.mail.isx.net.nz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
isx.net.nz
wm.mail.isx.net.nz |
134 KB |
1 |
wtttm.maori.nz
1 redirects
webmail.wtttm.maori.nz |
211 B |
7 | 2 |
Domain | Requested by | |
---|---|---|
7 | wm.mail.isx.net.nz |
wm.mail.isx.net.nz
|
1 | webmail.wtttm.maori.nz | 1 redirects |
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mail.isx.net.nz RapidSSL Global TLS RSA4096 SHA256 2022 CA1 |
2022-12-16 - 2024-01-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://wm.mail.isx.net.nz/
Frame ID: 14E261D71C1387CFA8CDC5F43A8BE58A
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
WebMail Sign InPage URL History Show full URLs
-
http://webmail.wtttm.maori.nz/
HTTP 301
https://wm.mail.isx.net.nz/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://webmail.wtttm.maori.nz/
HTTP 301
https://wm.mail.isx.net.nz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
wm.mail.isx.net.nz/ Redirect Chain
|
1 KB 848 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
wm.mail.isx.net.nz/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
wm.mail.isx.net.nz/ |
92 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.png
wm.mail.isx.net.nz/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backer.png
wm.mail.isx.net.nz/images/ |
207 B 453 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-graphic2.png
wm.mail.isx.net.nz/images/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
overlay.png
wm.mail.isx.net.nz/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
webmail.wtttm.maori.nz
wm.mail.isx.net.nz
111.65.230.83
111.65.230.88
1e1ddc4991bdeb663eb570dc900e16b0e607be004f312221a61cd2c832d160fd
2289025d54a89fa64e399aef37c2915a12f169625906b8ea29ac9baebf44b4d9
472ec0f2d6895da7a6f90ab2d0e55c21e6c7b647228278c069f526ce29617ca4
742e7bb7563b0a36886bdebf6cf171e098f38878b6b631bb65b87fc80932f45f
8c2910972d4fe1b29769dad2df16b75f76f8a52a33bf3140953d8874e8b51511
9921e2f1bd6441dc58e14b3cd66688ed8ca9194ac57d075b32a9809df7097182
de5b72fca3049d8ff4e171a950b62a241a1fc3947013881e2fad76e5ddc1a7c1