Security Scan Report: file58021321.icu

Redirected to: https://fattclick990.blob.core.windows.net/id74891398478193191424/webm.html

Submitted: Nov 24, 2025, 10:19:07 PMCompleted: Nov 24, 2025, 10:21:16 PMpubliccompleted
Loading additional data...

Summary

This website contacted 14 IPs in 4 countries across 6 domains to perform 23 HTTP transactions. The main domain is fattclick990.blob.core.windows.net and was registered NaN years ago.

Submitted URL: https://file58021321.icu/zbmt.php

Effective URL: https://fattclick990.blob.core.windows.net/id74891398478193191424/webm.htmlRedirected

AI Security Verdict

Confirmed Scam

Confidence: 95%

9
Risk Score

Confirmed phishing site impersonating Aruba Webmail, hosted on cloud storage.

Risk Factors
Credential harvesting forms on cloud storage domain (high‑risk per policy)
Brand impersonation of Aruba Webmail on untrusted domain
Multiple password fields indicate credential collection intent
Final destination is a blob storage URL, not the legitimate service
Domain is UNRANKED in Cisco Umbrella while claiming a well‑known brand
Domain age information unavailable

Details

Page Title

Webmail Aruba

Scan Type

public

Language

🇮🇹

Italian

(36% confidence)

Category

unknown

(0%)

Domain Information

The domain name 'file58021321.icu' uses the .icu top-level domain while skipping any subdomain. The second-level label 'file58021321' is 12 characters long with 2 vowels and two consonants; it also includes eight digits. Breaking it apart gives 2 words: file, 58021321. Median word length is six characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://file58021321.icu/zbmt.php

Page Load Overview

1.08s
Total Load Time
23
HTTP Requests
6
Domains
439 KB
Total Size

Language Analysis

Primary Language

🇮🇹Italian
Code: it
Confidence:36%
Script:Latin
Direction:ltr

Detection Details

Language Code:it
Detection Confidence:36%
Script Type:Latin
HTML Lang Attribute:en
Text Length:494 chars
Detector Agreement:100%
Language mismatch: Declared as en but detected as it

Website Classification

Primary Category

unknown0% confidence
Type: webapp
Method: structural

All Detected Categories

No categories detected

Detected Features

Login Form

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
1420.209.87.193Milan, Lombardy, Italy
AS8075MICROSOFT-CORP-MSN-AS-BLOCK
3104.16.175.226United States
AS13335CLOUDFLARENET
2142.250.184.227United States
AS15169GOOGLE
2104.17.24.14United States
AS13335CLOUDFLARENET
1190.123.46.89Panama
AS52284Panamaserver.com
1104.17.25.14United States
AS13335CLOUDFLARENET
1142.250.186.106United States
AS15169GOOGLE
12606:4700::6810:aee2United States
AS13335CLOUDFLARENET
12606:4700::6811:180eUnited States
AS13335CLOUDFLARENET
12606:4700::6810:afe2United States
AS13335CLOUDFLARENET
2314--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T14C22405060F4083751A785D93AA9670A3EC6E20BCB57450477FC4BE81FDBC83AE57A2E

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

96:nZF+zgW2Jucon/vs/c7vNN/jqaGEuPMsa3pTgd4rZN6RFqLQQxKAj:ZF+EW2J6ck/ZfLQQgAj

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:10556:wDwhCSlDEELAa7CEsmBAJAgtAzAUjRr6KM4UZoCCCgFAcAkCdQBKMNGHBAgBFEAAoIuYnYTZDghTAApyomOEkNMgCWHBJEiQ

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:ffcf878783cfffff
Perceptual Hash:b033c7cc7ec33838
Difference Hash:041e1a1f3f3a000c
Wavelet Hash:f38183818107ffe7
Color Hash:#7aac53

Other Hashes

Scan History

Scan history not available

Unable to load historical scan data