yuno67.xyz
Open in
urlscan Pro
54.204.70.201
Malicious Activity!
Public Scan
Submission: On November 16 via automatic, source phishtank — Scanned from DE
Summary
This is the only time yuno67.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 54.204.70.201 54.204.70.201 | 14618 (AMAZON-AES) (AMAZON-AES) | |
4 | 1 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-204-70-201.compute-1.amazonaws.com
yuno67.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
yuno67.xyz
yuno67.xyz |
92 KB |
4 | 1 |
Domain | Requested by | |
---|---|---|
4 | yuno67.xyz |
yuno67.xyz
|
4 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://yuno67.xyz/?em=a@b.com
Frame ID: 08D65BEC2C8743DEAD7536CF97A5B9DC
Requests: 4 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
yuno67.xyz/ |
476 B 793 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
captcha.js
yuno67.xyz/assets/js/ |
118 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
captcha.png
yuno67.xyz/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2134651.png
yuno67.xyz/ |
58 KB 45 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| setImmediate function| clearImmediate function| Vue1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
yuno67.xyz/ | Name: cazanova Value: b22be28dd4c53d1d71fd7258a139b078f69437ca |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
yuno67.xyz
54.204.70.201
0bd17eee6e7b62a1f82514279344a50bd56e986a10b720c6d9fabf9197d10c9a
64907bac65b3d6080557dbc26e2cc1ec94433cce8a4b7ad63dcf7ba4b959f948
64d95dd0058b02b2ba12f890111f0970818c47c8c771fdba38c098163eca0c20
e1678e66939660787d297768b442cc31ee07265fcacb6384e3603cfaaed7c39f