logins-microsoft.buyaga.go.ug Open in urlscan Pro
206.189.25.226  Malicious Activity! Public Scan

Submitted URL: http://khv.nv.buvuma.go.ug.///?QQQ#.
Effective URL: https://logins-microsoft.buyaga.go.ug/?username=
Submission: On November 08 via manual from GB — Scanned from GB

Summary

This website contacted 4 IPs in 3 countries across 3 domains to perform 6 HTTP transactions. The main IP is 206.189.25.226, located in London, United Kingdom and belongs to DIGITALOCEAN-ASN, US. The main domain is logins-microsoft.buyaga.go.ug.
TLS certificate: Issued by R3 on November 3rd 2022. Valid for: 3 months.
This is the only time logins-microsoft.buyaga.go.ug was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Community Verdicts: Malicious2 votes Show Verdicts

Domain & IP information

IP Address AS Autonomous System
2 154.72.194.114 327724 (NITA)
1 2001:4de0:ac1... 20446 (STACKPATH...)
2 206.189.25.226 14061 (DIGITALOC...)
6 4
Apex Domain
Subdomains
Transfer
2 buyaga.go.ug
logins-microsoft.buyaga.go.ug
23 KB
2 go.ug.
khv.nv.buvuma.go.ug.
1 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 959
30 KB
6 3
Domain Requested by
2 logins-microsoft.buyaga.go.ug khv.nv.buvuma.go.ug.
logins-microsoft.buyaga.go.ug
2 khv.nv.buvuma.go.ug. code.jquery.com
1 code.jquery.com khv.nv.buvuma.go.ug.
6 3

This site contains no links.

Subject Issuer Validity Valid
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2022-08-03 -
2023-07-14
a year crt.sh
buyaga.go.ug
R3
2022-11-03 -
2023-02-01
3 months crt.sh

This page contains 1 frames:

Frame: https://logins-microsoft.buyaga.go.ug/?username=
Frame ID: 5472174106EA46354FDA62F4688EEC03
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Wait...

Page URL History Show full URLs

  1. http://khv.nv.buvuma.go.ug.///?QQQ Page URL
  2. https://logins-microsoft.buyaga.go.ug/?username= Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

6
Requests

50 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

4
IPs

3
Countries

54 kB
Transfer

146 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://khv.nv.buvuma.go.ug.///?QQQ Page URL
  2. https://logins-microsoft.buyaga.go.ug/?username= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
khv.nv.buvuma.go.ug.///
733 B
764 B
Document
General
Full URL
http://khv.nv.buvuma.go.ug.///?QQQ
Protocol
HTTP/1.1
Server
154.72.194.114 Kampala, Uganda, ASN327724 (NITA, UG),
Reverse DNS
wh3.nita.go.ug
Software
Apache /
Resource Hash
a33d91fd565c34f02e8d6aad140c999e4bd92f1a9f10469a00a62e0648aeb2c5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

Cache-Control
max-age=0, no-cache, s-maxage=10
Connection
Upgrade, Keep-Alive
Content-Encoding
gzip
Content-Length
423
Content-Type
text/html; charset=UTF-8
Date
Tue, 08 Nov 2022 18:48:35 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Upgrade
h2,h2c
Vary
Accept-Encoding
X-Mod-Pagespeed
1.13.35.2-0
jquery-3.6.0.min.js
code.jquery.com/
87 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: khv.nv.buvuma.go.ug.
URL: http://khv.nv.buvuma.go.ug.///?QQQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:2a , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

Referer
http://khv.nv.buvuma.go.ug./
Origin
http://khv.nv.buvuma.go.ug.
accept-language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

date
Tue, 08 Nov 2022 18:49:48 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-15d9d"
vary
Accept-Encoding
x-hw
1667933388.dop071.lo4.t,1667933388.cds234.lo4.hn,1667933388.cds081.lo4.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30875
red.php
khv.nv.buvuma.go.ug.///
48 B
324 B
XHR
General
Full URL
http://khv.nv.buvuma.go.ug.///red.php
Requested by
Host: code.jquery.com
URL: https://code.jquery.com/jquery-3.6.0.min.js
Protocol
HTTP/1.1
Server
154.72.194.114 Kampala, Uganda, ASN327724 (NITA, UG),
Reverse DNS
wh3.nita.go.ug
Software
Apache /
Resource Hash

Request headers

Accept
*/*
Referer
http://khv.nv.buvuma.go.ug.///?QQQ
X-Requested-With
XMLHttpRequest
accept-language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Tue, 08 Nov 2022 18:48:37 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
X-Mod-Pagespeed
1.13.35.2-0
Cache-Control
max-age=0, no-cache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
48
Primary Request /
logins-microsoft.buyaga.go.ug/
58 KB
22 KB
Document
General
Full URL
https://logins-microsoft.buyaga.go.ug/?username=
Requested by
Host: khv.nv.buvuma.go.ug.
URL: http://khv.nv.buvuma.go.ug.///?QQQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
206.189.25.226 London, United Kingdom, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
d41563f03b569d645c988a25211f01b849bdd2acca3e5cbbb9a4b666a8fd9c86
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
http://khv.nv.buvuma.go.ug./
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

content-encoding
gzip
content-type
text/html; charset=utf-8
date
Tue, 08 Nov 2022 18:49:51 GMT
server
nginx
strict-transport-security
max-age=31536000; includeSubDomains
vary
Accept-Encoding
/
logins-microsoft.buyaga.go.ug/
199 B
348 B
Fetch
General
Full URL
https://logins-microsoft.buyaga.go.ug/?username=
Requested by
Host: logins-microsoft.buyaga.go.ug
URL: https://logins-microsoft.buyaga.go.ug/?username=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
206.189.25.226 London, United Kingdom, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
f17d4a2aed5bf1cbd71e88b258a7ef17347005eae5550122deabaae1b0c32476
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
accept-language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
Content-Type
application/json

Response headers

date
Tue, 08 Nov 2022 18:49:52 GMT
content-encoding
gzip
strict-transport-security
max-age=31536000; includeSubDomains
server
nginx
vary
Accept-Encoding
content-type
application/json
/
logins-microsoft.buyaga.go.ug/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
logins-microsoft.buyaga.go.ug
URL
https://logins-microsoft.buyaga.go.ug/?username=

Verdicts & Comments Add Verdict or Comment


Malicious page.url
Submitted on November 8th 2022, 6:51:24 pm UTC — From United Kingdom

Threats: Phishing Brand Impersonation
Brands: Microsoft US
Comment: spoofed microsoft domain

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation

0 Cookies