www.sant-elena.com
Open in
urlscan Pro
31.11.33.11
Malicious Activity!
Public Scan
Effective URL: https://www.sant-elena.com/dmortinakilaju/jukalk/ikuljnh.php
Submission: On April 12 via automatic, source phishtank — Scanned from FR
Summary
TLS certificate: Issued by Actalis Domain Validation Server CA G3 on August 1st 2022. Valid for: a year.
This is the only time www.sant-elena.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Aruba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 92.205.5.130 92.205.5.130 | 21499 (GODADDY-SXB) (GODADDY-SXB) | |
1 | 31.11.33.11 31.11.33.11 | 31034 (ARUBA-ASN) (ARUBA-ASN) | |
1 | 95.101.54.202 95.101.54.202 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 34.250.51.186 34.250.51.186 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 4 |
ASN21499 (GODADDY-SXB, DE)
PTR: 130.5.205.92.host.secureserver.net
densiyoetah.amarilogroup.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a95-101-54-202.deploy.static.akamaitechnologies.com
secure-ds.serving-sys.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-34-250-51-186.eu-west-1.compute.amazonaws.com
w.usabilla.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
usabilla.com
w.usabilla.com — Cisco Umbrella Rank: 3392 |
11 KB |
1 |
serving-sys.com
secure-ds.serving-sys.com — Cisco Umbrella Rank: 2503 |
80 KB |
1 |
sant-elena.com
www.sant-elena.com |
306 KB |
1 |
amarilogroup.com
1 redirects
densiyoetah.amarilogroup.com |
272 B |
3 | 4 |
Domain | Requested by | |
---|---|---|
1 | w.usabilla.com |
srcdoc
|
1 | secure-ds.serving-sys.com |
www.sant-elena.com
|
1 | www.sant-elena.com | |
1 | densiyoetah.amarilogroup.com | 1 redirects |
3 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.sant-elena.com Actalis Domain Validation Server CA G3 |
2022-08-01 - 2023-09-01 |
a year | crt.sh |
secure-ds.serving-sys.com R3 |
2023-02-21 - 2023-05-22 |
3 months | crt.sh |
w.usabilla.com Amazon RSA 2048 M01 |
2023-02-09 - 2024-02-09 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.sant-elena.com/dmortinakilaju/jukalk/ikuljnh.php
Frame ID: 070C77BE0C6EC2D4B74AE6F042F6A656
Requests: 11 HTTP requests in this frame
Frame:
https://w.usabilla.com/7fe6a6518d1e.js?lv=1
Frame ID: C8D88763A7A745D189CC60D75016D714
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Servizio Hosting - Aruba.itPage URL History Show full URLs
-
http://densiyoetah.amarilogroup.com/
HTTP 301
https://www.sant-elena.com/dmortinakilaju/jukalk/ikuljnh.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Sizmek (Advertising Networks) Expand
Detected patterns
- serving-sys\.com/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://densiyoetah.amarilogroup.com/
HTTP 301
https://www.sant-elena.com/dmortinakilaju/jukalk/ikuljnh.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
ikuljnh.php
www.sant-elena.com/dmortinakilaju/jukalk/ Redirect Chain
|
306 KB 306 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
areaclienti-EN-no-promo_67430145580878486.jpg
secure-ds.serving-sys.com/resources/PROD/asset/1073743419/IMAGE/20211217/ |
79 KB 80 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
219 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
822 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
45 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7fe6a6518d1e.js
w.usabilla.com/ Frame C8D8 |
36 KB 11 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Aruba (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless function| savepage_ShadowLoader0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
densiyoetah.amarilogroup.com
secure-ds.serving-sys.com
w.usabilla.com
www.sant-elena.com
31.11.33.11
34.250.51.186
92.205.5.130
95.101.54.202
27a9a24907f8907c98afcf081684fe8fe95f3381ef49ff0d56c9e8e1eb525b6f
5d746dbba741cc1efdc26938dd5ed8e1800a0e28a2939447a85f028dfdf8f67e
6676b05ef9626756989d9dbc09608830af666a330ad1bfa12438b9775330c474
6c46bf722fb11c3066171661ece073b58b6ea6c16b00a9d3cc162a6f215b57f1
918b7dc3e2e2d015c16ce08b57bcb64d2253bafc1707658f361e72865498e537
a525f163e73542be1b82c5ae4e4beed74d137d56161ac5b02833a279ef6d9b61
b7fd66e7218e3267d3968a3648c882f33ea39d19d94fc64541efe76fd6385e3d
bcedcafd81248b08cb428b22618a38866d0cee85b4e9ecd27ef734d0533e2792
c447dd7677b419db7b21dbdfc6277c7816a913ffda76fd2e52702df538de0e49
d97f82101e352bffa08e2ba37f5c74d39996c9b385417a90249123875e7652c3
d9ad9ccafbc7696d83a75b36483dc07f3a1465c7d4443047f7d2803045435dcd
ea8102aa48e148730886e2055561e40c78f1203291fe59c49cb8ae557fc9291f