pending-messages.aesahea.com
Open in
urlscan Pro
194.180.224.197
Malicious Activity!
Public Scan
Effective URL: https://pending-messages.aesahea.com/?email=ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ==
Submission: On March 06 via manual from IN
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 4th 2020. Valid for: 3 months.
This is the only time pending-messages.aesahea.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 89.25.223.88 89.25.223.88 | 31242 (TKPSA-AS) (TKPSA-AS) | |
1 1 | 2606:4700:303... 2606:4700:3030::681b:a097 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 194.180.224.197 194.180.224.197 | 44685 (REBECCAHOST) (REBECCAHOST) | |
1 | 2606:4700::68... 2606:4700::6811:4004 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
2 | 2.16.181.34 2.16.181.34 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
13 | 4 |
ASN31242 (TKPSA-AS, PL)
PTR: host-89.25.223.88.static.3s.pl
www.salesmanago.pl |
ASN20940 (AKAMAI-ASN1, US)
PTR: a2-16-181-34.deploy.static.akamaitechnologies.com
aadcdn.msftauthimages.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
aesahea.com
pending-messages.aesahea.com |
396 KB |
2 |
msftauthimages.net
aadcdn.msftauthimages.net |
128 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
gaeoslo.com
1 redirects
gaeoslo.com |
353 B |
1 |
salesmanago.pl
1 redirects
www.salesmanago.pl |
358 B |
13 | 6 |
Domain | Requested by | |
---|---|---|
9 | pending-messages.aesahea.com |
pending-messages.aesahea.com
code.jquery.com |
2 | aadcdn.msftauthimages.net | |
1 | code.jquery.com |
pending-messages.aesahea.com
|
1 | cdnjs.cloudflare.com |
pending-messages.aesahea.com
|
1 | gaeoslo.com | 1 redirects |
1 | www.salesmanago.pl | 1 redirects |
13 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pending-messages.aesahea.com Let's Encrypt Authority X3 |
2020-03-04 - 2020-06-02 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-12-05 - 2020-06-12 |
6 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
aadcdn.msftauthimages.net Microsoft IT TLS CA 5 |
2018-11-29 - 2020-11-29 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://pending-messages.aesahea.com/?email=ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ==
Frame ID: FB76D26E71245B799FFB8948A304AA35
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.salesmanago.pl/rd.htm?url=https%3A%2F%2Fgaeoslo.com/zyu.com/ZWxpby50YWdsaW9sYUBhdmFuYWRlLmN...
HTTP 303
https://gaeoslo.com/zyu.com/ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ== HTTP 302
https://pending-messages.aesahea.com/?email=ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ== Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.salesmanago.pl/rd.htm?url=https%3A%2F%2Fgaeoslo.com/zyu.com/ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ==
HTTP 303
https://gaeoslo.com/zyu.com/ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ== HTTP 302
https://pending-messages.aesahea.com/?email=ZWxpby50YWdsaW9sYUBhdmFuYWRlLmNvbQ== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
pending-messages.aesahea.com/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
pending-messages.aesahea.com/lib/css/ |
100 KB 100 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo3.png
pending-messages.aesahea.com/lib/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.svg
pending-messages.aesahea.com/lib/img/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
pending-messages.aesahea.com/lib/img/ |
513 B 759 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
pending-messages.aesahea.com/lib/img/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
maximum.js
pending-messages.aesahea.com/lib/js/ |
3 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
pending-messages.aesahea.com/lib/img/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
brand.php
pending-messages.aesahea.com/ |
327 B 534 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bannerlogo
aadcdn.msftauthimages.net/dbd5a2dd-bnyh0rdrr6csjq0a2ifu-l96ggja09-jukoq2xlpf9q/logintenantbranding/0/ |
8 KB 8 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
illustration
aadcdn.msftauthimages.net/dbd5a2dd-bnyh0rdrr6csjq0a2ifu-l96ggja09-jukoq2xlpf9q/logintenantbranding/0/ |
120 KB 120 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| true_email object| input object| inputz0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauthimages.net
cdnjs.cloudflare.com
code.jquery.com
gaeoslo.com
pending-messages.aesahea.com
www.salesmanago.pl
194.180.224.197
2.16.181.34
2001:4de0:ac19::1:b:2a
2606:4700:3030::681b:a097
2606:4700::6811:4004
89.25.223.88
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
2320122c1df7a491d416d66819024cf15bd121e0eb8cec6676760bac3af53834
2c723bf7fcc092e5c4d189173fe7aede9e5e3733a692161211aee9361cbf46ae
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
36e0a7e08bee65774168528938072c536437669c1b7458ac77976ec788e4439c
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
b5d587f6c48a9b22bbe97150249e0c0655ac1780bd273431480a22f8a5bfef6c
c1bd7fd316c4a033b19867f7de7016b5f79ab8916693122445330b11cd69a846
d88beb30920018e76b49e1f6c1a17f329b53605abbe6dadb6c4a2a48f8a7e660
f32fd03907e6349c8c2195676ba78089378de19c6c7e07fcdf6a6f55d2815839
f4195cc24b823ff3704e6501788245537de7c8f75e0c4b5efd874b1053f9807f