taylorselectrical.co.nz
Open in
urlscan Pro
192.185.149.58
Malicious Activity!
Public Scan
Effective URL: https://taylorselectrical.co.nz/cm/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login...
Submission: On February 21 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on February 12th 2020. Valid for: 3 months.
This is the only time taylorselectrical.co.nz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 66.117.16.17 66.117.16.17 | 15224 (OMNITURE) (OMNITURE) | |
2 2 | 104.168.155.115 104.168.155.115 | 54290 (HOSTWINDS) (HOSTWINDS) | |
1 2 | 192.185.149.58 192.185.149.58 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 40.126.1.141 40.126.1.141 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 3 |
ASN15224 (OMNITURE, US)
PTR: r17.p23.neolane.net
t.mid.accor-mail.com |
ASN54290 (HOSTWINDS, US)
PTR: client-104-168-155-115.hostwindsdns.com
royalbrushinc.com |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: ns373.websitewelcome.com
taylorselectrical.co.nz |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
login.microsoftonline.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
taylorselectrical.co.nz
1 redirects
taylorselectrical.co.nz |
22 KB |
2 |
royalbrushinc.com
2 redirects
royalbrushinc.com |
354 B |
1 |
microsoftonline.com
login.microsoftonline.com |
|
1 |
accor-mail.com
1 redirects
t.mid.accor-mail.com |
677 B |
2 | 4 |
Domain | Requested by | |
---|---|---|
2 | taylorselectrical.co.nz | 1 redirects |
2 | royalbrushinc.com | 2 redirects |
1 | login.microsoftonline.com |
taylorselectrical.co.nz
|
1 | t.mid.accor-mail.com | 1 redirects |
2 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
taylorselectrical.co.nz Let's Encrypt Authority X3 |
2020-02-12 - 2020-05-12 |
3 months | crt.sh |
stamp2.login.microsoftonline.com Microsoft IT TLS CA 1 |
2018-09-24 - 2020-09-24 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://taylorselectrical.co.nz/cm/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=dGFsaW4ubWFjYXJ0aHVyQHRlY2huaWNvbG9yLmNvbQ==
Frame ID: 6E25D57EB8C51051B6015B0E8FB1C269
Requests: 5 HTTP requests in this frame
Frame:
https://login.microsoftonline.com/logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033&id=501392
Frame ID: 56D91F64749C9939E980E2A8B458B4ED
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://t.mid.accor-mail.com/r/?id=h798296eb%2C17cd18ef%2C1a2da5fe&p1=royalbrushinc.com/wp-content/%2Fja%...
HTTP 302
https://royalbrushinc.com/wp-content//ja?SWAd=talin.macarthur@technicolor.com HTTP 301
https://royalbrushinc.com/wp-content/ja/?SWAd=talin.macarthur@technicolor.com HTTP 303
https://taylorselectrical.co.nz/cm/?email=talin.macarthur@technicolor.com HTTP 302
https://taylorselectrical.co.nz/cm/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-le... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://t.mid.accor-mail.com/r/?id=h798296eb%2C17cd18ef%2C1a2da5fe&p1=royalbrushinc.com/wp-content/%2Fja%3FSWAd%3Dtalin.macarthur@technicolor.com
HTTP 302
https://royalbrushinc.com/wp-content//ja?SWAd=talin.macarthur@technicolor.com HTTP 301
https://royalbrushinc.com/wp-content/ja/?SWAd=talin.macarthur@technicolor.com HTTP 303
https://taylorselectrical.co.nz/cm/?email=talin.macarthur@technicolor.com HTTP 302
https://taylorselectrical.co.nz/cm/home.php?cid=2327&utm_term=2327&utm_campaign=login&utm_medium=help-and-learn&utm_source=login_frontend_hosting&utm_content=flyin&id=dGFsaW4ubWFjYXJ0aHVyQHRlY2huaWNvbG9yLmNvbQ== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
home.php
taylorselectrical.co.nz/cm/ Redirect Chain
|
41 KB 22 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
logout.srf
login.microsoftonline.com/ Frame 56D9 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
20 KB 0 |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate14 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
login.microsoftonline.com/ | Name: stsservicecookie Value: ests |
|
login.microsoftonline.com/ | Name: x-ms-gateway-slice Value: prod |
|
.login.microsoftonline.com/ | Name: esctx Value: AQABAAAAAABeAFzDwllzTYGDLh_qYbH8a1LEA5lWq5DvInJOsDHWvDlUE1AEIrMzsV2lJTJkQu5eF_UHjHZsKRTp8HgilHstgwDRJdxFWojRca-K4jcXXMT88DZNE1H2y2UJkGPEQ6px1gPZTnxEL_pxJUm_-trR9y2oW-Ujn3Rw8zeqTbwsxPOmIAwQiFz3hJLLGpeWBqEgAA |
|
login.microsoftonline.com/ | Name: buid Value: AQABAAEAAABeAFzDwllzTYGDLh_qYbH8ZOfCfz_xsxoN7MFOdpYEFvBf485dcQoYpfqDGDw_VhF4vJsfpoLx3sILeFlUflPDZmIfzmbSlQHq9CQilEiah10bEJJ0IlKchROjllaQSa4gAA |
|
login.microsoftonline.com/ | Name: AADSSOTILES Value: 1 |
|
login.microsoftonline.com/ | Name: ESTSSC Value: 00 |
|
.login.microsoftonline.com/ | Name: ch Value: Nli2khwUK9ehUWXcoXJTJlNSmnEAlLNOIGr8_LvdWXc |
|
login.microsoftonline.com/ | Name: ESTSAUTHLIGHT Value: + |
|
.login.microsoftonline.com/ | Name: ESTSAUTHPERSISTENT Value: AQABAAQAAABeAFzDwllzTYGDLh_qYbH8hAj3uuMxYc8QbW6lGz7QI1yNBMKXjVrAbQE-vS5sJnrnfPbu8sKzFFmL9Ta80feUhkheAiMyMfafV52tlAg3XSj5LYXuSWTUVK_45ZRaQGVQdEQcRZ_hFNs2IhZjUycWNYSwuxyXzuaFHwqI2aXaLC7d8YIpeG34rfV39Hd2b_Qs0QQUjnKvbZxFmwWqt0yZh_1MnTuZVn55Gc1lTTAhziAAIABAACAAAAA |
|
login.microsoftonline.com/ | Name: fpc Value: Aox6yeQmALBJtGbnmj7PnsA |
|
login.microsoftonline.com/ | Name: ESTSSSOTILES Value: 1 |
|
login.microsoftonline.com/ | Name: SignInStateCookie Value: CAQABAAIAAABeAFzDwllzTYGDLh_qYbH8OCFucG0bTt3d32OXTC_xntmgNfFwfKunNIrnbyMgMH1TxEdiHmZMALvo_LfwIPzt_U4O-A9UwEpI1_z9ed1tAiAA |
|
.login.microsoftonline.com/ | Name: ESTSAUTH Value: AQABAAQAAABeAFzDwllzTYGDLh_qYbH8GCNzd_hKcYXMgEje04vx2uJzZpe897C4sVQno9DjVkfWCTRkqsBNSA8TA0RGx7md6aNTIBPNc2fRaLt-1ryKUF6rJXnNYpJCl1tXTMO6Hn6Hz_kzo--rnMFlrl0WJCqQQYu-LmvXnpoceoVePNIQ_umRkSH6H4Hpxo7LuzBzhibk2cx_pIaYJBc3VjDWovfiUcDC5mn96H8pzYccN5SCbCAAIABAACAAAAA |
|
taylorselectrical.co.nz/ | Name: PHPSESSID Value: rkbotfkjsj99l15u5rne82dfl3 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.microsoftonline.com
royalbrushinc.com
t.mid.accor-mail.com
taylorselectrical.co.nz
104.168.155.115
192.185.149.58
40.126.1.141
66.117.16.17
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7
379765ab31aed2e0d3cdef473f0c2a3f0ee46391724fc7a8024e901c261cdcba
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b
e6cfb5919907db444247d79a0d760cfe4f6e0fa8c21333f6654c41dc27d80157