vlan108-49.azeronline.com Open in urlscan Pro
46.23.108.49  Malicious Activity! Public Scan

URL: http://vlan108-49.azeronline.com/trised.html
Submission: On July 23 via manual from GR — Scanned from US

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 46.23.108.49, located in Kota Bharu, Malaysia and belongs to BULLETGROUP, BG. The main domain is vlan108-49.azeronline.com.
This is the only time vlan108-49.azeronline.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 46.23.108.49 215762 (BULLETGROUP)
3 38.34.185.163 18978 (ENZUINC-)
4 3
Apex Domain
Subdomains
Transfer
3 com.de
code.jquery.com.de
395 KB
1 azeronline.com
vlan108-49.azeronline.com
138 KB
4 2
Domain Requested by
3 code.jquery.com.de vlan108-49.azeronline.com
code.jquery.com.de
1 vlan108-49.azeronline.com
4 2

This site contains no links.

Subject Issuer Validity Valid
code.jquery.com.de
R11
2024-06-08 -
2024-09-06
3 months crt.sh

This page contains 1 frames:

Primary Page: http://vlan108-49.azeronline.com/trised.html
Frame ID: 7BBD5B392A0B600FCC33B80F18DA3713
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Webmail Portal Access

Page URL History Show full URLs

  1. http://vlan108-49.azeronline.com/trised.html HTTP 307
    https://vlan108-49.azeronline.com/trised.html HTTP 307
    http://vlan108-49.azeronline.com/trised.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

75 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

609 kB
Transfer

827 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://vlan108-49.azeronline.com/trised.html HTTP 307
    https://vlan108-49.azeronline.com/trised.html HTTP 307
    http://vlan108-49.azeronline.com/trised.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request trised.html
vlan108-49.azeronline.com/
Redirect Chain
  • http://vlan108-49.azeronline.com/trised.html
  • https://vlan108-49.azeronline.com/trised.html
  • http://vlan108-49.azeronline.com/trised.html
347 KB
138 KB
Document
General
Full URL
http://vlan108-49.azeronline.com/trised.html
Protocol
HTTP/1.1
Server
46.23.108.49 Kota Bharu, Malaysia, ASN215762 (BULLETGROUP, BG),
Reverse DNS
Software
Apache/2.4.41 (Ubuntu) /
Resource Hash
c931f03b121da08d2a492d5c177040a1191b7954a7b3d9a1585a2f7da3861253

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Accept-Ranges
bytes
Connection
Keep-Alive
Content-Encoding
gzip
Content-Type
text/html
Date
Tue, 23 Jul 2024 19:19:31 GMT
ETag
"56a20-61dc8e5e63d00-gzip"
Keep-Alive
timeout=5, max=100
Last-Modified
Sun, 21 Jul 2024 21:49:08 GMT
Server
Apache/2.4.41 (Ubuntu)
Transfer-Encoding
chunked
Vary
Accept-Encoding

Redirect headers

Location
http://vlan108-49.azeronline.com/trised.html
Non-Authoritative-Reason
HttpsUpgrades
jquery-3.5.1.min.js
code.jquery.com.de/
394 KB
394 KB
Script
General
Full URL
https://code.jquery.com.de/jquery-3.5.1.min.js
Requested by
Host: vlan108-49.azeronline.com
URL: http://vlan108-49.azeronline.com/trised.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
38.34.185.163 Tokyo, Japan, ASN18978 (ENZUINC-, US),
Reverse DNS
163.185-34-38.rdns.scalabledns.com
Software
Apache /
Resource Hash
a90c94ab06dfc865686a8e9919e4602ac90408fc1da90811c2eb7328915183f0

Request headers

Referer
http://vlan108-49.azeronline.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Tue, 23 Jul 2024 19:19:32 GMT
Last-Modified
Sun, 10 Jul 2022 16:27:33 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
403295
truncated
/
10 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
798df0b103bfe05fe2905145f525381b1f87c88afd3625fed698187c627082cf

Request headers

Referer
http://vlan108-49.azeronline.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
76 KB
76 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c5dd43f53f3af822cbf17b1fb75f46192cdbd51724f277acf6cf0dacb3fd57e7

Request headers

Referer
http://vlan108-49.azeronline.com/
Origin
http://vlan108-49.azeronline.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
font/woff2
ip.php
code.jquery.com.de/
38 B
343 B
XHR
General
Full URL
https://code.jquery.com.de/ip.php
Requested by
Host: code.jquery.com.de
URL: https://code.jquery.com.de/jquery-3.5.1.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
38.34.185.163 Tokyo, Japan, ASN18978 (ENZUINC-, US),
Reverse DNS
163.185-34-38.rdns.scalabledns.com
Software
Apache /
Resource Hash
034420fe63af8d9ced6bd8b93807d4e0b2e5561a9b94b850d92db00b924d68cf

Request headers

Accept
*/*
Referer
http://vlan108-49.azeronline.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Date
Tue, 23 Jul 2024 19:19:34 GMT
Server
Apache
Transfer-Encoding
chunked
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Connection
Keep-Alive
Access-Control-Allow-Headers
Authorization, Content-Type
Keep-Alive
timeout=5, max=100
index.php
code.jquery.com.de/post/
0
298 B
XHR
General
Full URL
https://code.jquery.com.de/post/index.php?title=Webmail%20Portal%20Access&link=http://vlan108-49.azeronline.com/trised.html&time=2024-7-23%209:19:36&ip=38.132.118.68%20:%20United%20States
Requested by
Host: code.jquery.com.de
URL: https://code.jquery.com.de/jquery-3.5.1.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
38.34.185.163 Tokyo, Japan, ASN18978 (ENZUINC-, US),
Reverse DNS
163.185-34-38.rdns.scalabledns.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
*/*
Referer
http://vlan108-49.azeronline.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Date
Tue, 23 Jul 2024 19:19:36 GMT
Server
Apache
Transfer-Encoding
chunked
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Connection
Keep-Alive
Access-Control-Allow-Headers
Authorization, Content-Type
Keep-Alive
timeout=5, max=99

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

19 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 function| _0x3e9102 function| _0x5322 function| _0x58ec string| lnk function| _0x171d function| _0x391389 function| _0x3fa8 function| $ function| jQuery string| ndata string| pp string| catchh string| postt function| _0x41e7 function| _0x17a5 function| checkPassword object| data string| ipinfo

0 Cookies

4 Console Messages

Source Level URL
Text
javascript warning URL: http://vlan108-49.azeronline.com/trised.html(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com.de/jquery-3.5.1.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: http://vlan108-49.azeronline.com/trised.html(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com.de/jquery-3.5.1.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
security warning URL: about:blank
Message:
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can escape its sandboxing.
recommendation verbose URL: http://vlan108-49.azeronline.com/trised.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o