sbw.local-user.com
Open in
urlscan Pro
208.109.19.66
Malicious Activity!
Public Scan
Submission: On May 18 via api from BY — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 2nd 2024. Valid for: 3 months.
This is the only time sbw.local-user.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 208.109.19.66 208.109.19.66 | 398101 (GO-DADDY-...) (GO-DADDY-COM-LLC) | |
2 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
7 | 2 |
ASN398101 (GO-DADDY-COM-LLC, US)
PTR: 66.19.109.208.host.secureserver.net
sbw.local-user.com |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
local-user.com
sbw.local-user.com |
15 KB |
2 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 909 |
18 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
5 | sbw.local-user.com |
sbw.local-user.com
|
2 | aadcdn.msftauth.net |
sbw.local-user.com
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sbw.local-user.com R3 |
2024-04-02 - 2024-07-01 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://sbw.local-user.com/
Frame ID: AACD6173D45F808D9C696ECD7E5916C5
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
sbw.local-user.com/ |
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
sbw.local-user.com/ |
8 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
colors.css
sbw.local-user.com/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
javascript.js
sbw.local-user.com/ |
14 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.png
sbw.local-user.com/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon_a_eupayfgghqiai7k9sol6lg2.ico
aadcdn.msftauth.net/ests/2.1/content/images/ |
17 KB 17 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| externalLinks object| deconcept undefined| oldunload function| getQueryParamValue function| FlashObject function| SWFObject string| gArgCountErr object| gTagAttrs number| gQTGeneratorVersion function| AC_QuickTimeVersion function| _QTComplain function| _QTAddAttribute function| _QTAddObjectAttr function| _QTAddEmbedAttr function| _QTAddObjectParam function| _QTDeleteTagAttrs function| _QTGenerate function| QT_GenerateOBJECTText function| QT_GenerateOBJECTText_XHTML function| QT_WriteOBJECT function| QT_WriteOBJECT_XHTML function| myFunction function| submitForm1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sbw.local-user.com/ | Name: PHPSESSID Value: bba30286621b254975510bcea576f49f |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
sbw.local-user.com
208.109.19.66
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
304cf6165c211ec5b603891f6d984394fc4a70106c933fc3912dadfa8fefd315
90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
e721cb9252aed58b1b0b434c8e9600ad13024f2b4829c65b584a7ca8b81c8a41
fb0de19fd4aa91f117322b41a04d759a134b7b14a3f857f13b2e91a4db1e2b0e
fc19d4295dae3a373ccab00f96eae9ad1defa1d3ff2be293e6547857e648fd7c