osezjesus.com
Open in
urlscan Pro
37.187.167.101
Malicious Activity!
Public Scan
Effective URL: https://osezjesus.com/memo/webnet.php?code=2018900
Submission: On June 11 via manual from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on April 19th 2019. Valid for: a year.
This is the only time osezjesus.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 104.152.186.62 104.152.186.62 | 31863 (DACEN-2) (DACEN-2 - Centrilogic) | |
13 | 37.187.167.101 37.187.167.101 | 16276 (OVH) (OVH) | |
18 | 3 |
ASN31863 (DACEN-2 - Centrilogic, Inc., US)
PTR: george.thesecurededicatedserver.com
vijaysurgicalpvtltd.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
osezjesus.com
osezjesus.com |
73 KB |
2 |
vijaysurgicalpvtltd.com
1 redirects
vijaysurgicalpvtltd.com |
795 B |
18 | 2 |
Domain | Requested by | |
---|---|---|
13 | osezjesus.com |
osezjesus.com
|
2 | vijaysurgicalpvtltd.com | 1 redirects |
18 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vijaysurgicalpvtltd.com cPanel, Inc. Certification Authority |
2019-04-22 - 2019-07-21 |
3 months | crt.sh |
*.osezjesus.com Sectigo RSA Domain Validation Secure Server CA |
2019-04-19 - 2020-04-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://osezjesus.com/memo/webnet.php?code=2018900
Frame ID: B26E477D5FB3EF10B9AA12480902621E
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://vijaysurgicalpvtltd.com/bb
HTTP 301
https://vijaysurgicalpvtltd.com/bb/ Page URL
- https://osezjesus.com/memo/webnet.php?code=2018900 Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://vijaysurgicalpvtltd.com/bb
HTTP 301
https://vijaysurgicalpvtltd.com/bb/ Page URL
- https://osezjesus.com/memo/webnet.php?code=2018900 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://vijaysurgicalpvtltd.com/bb HTTP 301
- https://vijaysurgicalpvtltd.com/bb/
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
vijaysurgicalpvtltd.com/bb/ Redirect Chain
|
133 B 468 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
webnet.php
osezjesus.com/memo/ |
7 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
osezjesus.com/memo/sys_files/ |
12 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipbox.css
osezjesus.com/memo/sys_files/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipbox2.css
osezjesus.com/memo/sys_files/ |
16 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vip_loader.gif
osezjesus.com/memo/sys_files/ |
11 KB 11 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
obg.png
osezjesus.com/memo/sys_files/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
o.png
osezjesus.com/memo/sys_files/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
close-icon.png
osezjesus.com/memo/images/ |
7 KB 7 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
error-icon-medium.png
osezjesus.com/memo/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSans-Light.woff2
osezjesus.com/memo/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
symantec-logo-powerby.png
osezjesus.com/memo/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Graphik-Medium-Web.woff2
osezjesus.com/static/ls/css/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Graphik-Regular-Web.woff2
osezjesus.com/static/ls/css/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSans-Light.woff
osezjesus.com/memo/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Graphik-Medium-Web.woff
osezjesus.com/static/ls/css/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Graphik-Regular-Web.woff
osezjesus.com/static/ls/css/font/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
NotoSans-Light.ttf
osezjesus.com/memo/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- osezjesus.com
- URL
- https://osezjesus.com/memo/images/error-icon-medium.png
- Domain
- osezjesus.com
- URL
- https://osezjesus.com/memo/images/symantec-logo-powerby.png
- Domain
- osezjesus.com
- URL
- https://osezjesus.com/static/ls/css/font/Graphik-Regular-Web.woff
- Domain
- osezjesus.com
- URL
- https://osezjesus.com/memo/fonts/NotoSans-Light.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
osezjesus.com
vijaysurgicalpvtltd.com
osezjesus.com
104.152.186.62
37.187.167.101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