prettynbitchy.com
Open in
urlscan Pro
209.182.195.29
Malicious Activity!
Public Scan
Effective URL: http://prettynbitchy.com/auth/?client-request-id=Z3VpZG8uYnJvY2tzY2htaWR0QHNvbHZheWE9
Submission Tags: falconsandbox
Submission: On February 07 via api from US — Scanned from DE
Summary
This is the only time prettynbitchy.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 162.0.209.119 162.0.209.119 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
4 | 209.182.195.29 209.182.195.29 | 22611 (INMOTION) (INMOTION) | |
1 | 13.32.99.36 13.32.99.36 | 16509 (AMAZON-02) (AMAZON-02) | |
5 | 2 |
ASN22612 (NAMECHEAP-NET, US)
PTR: premium172-3.web-hosting.com
belleclick.com |
ASN22611 (INMOTION, US)
PTR: vps32770.inmotionhosting.com
prettynbitchy.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-99-36.fra60.r.cloudfront.net
logo.clearbit.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
prettynbitchy.com
prettynbitchy.com |
105 KB |
1 |
clearbit.com
logo.clearbit.com — Cisco Umbrella Rank: 28071 |
|
1 |
belleclick.com
1 redirects
belleclick.com |
275 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
4 | prettynbitchy.com |
prettynbitchy.com
|
1 | logo.clearbit.com |
prettynbitchy.com
|
1 | belleclick.com | 1 redirects |
5 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
clearbit.com Amazon |
2021-04-22 - 2022-05-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://prettynbitchy.com/auth/?client-request-id=Z3VpZG8uYnJvY2tzY2htaWR0QHNvbHZheWE9
Frame ID: FB27521184570A37AFE36772BA763133
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Outlook Web AppPage URL History Show full URLs
-
https://belleclick.com/guidr7Pa7Xbrr7PB8xksB8xhmidtq0Hsr7Plvaya=
HTTP 302
http://prettynbitchy.com/auth/?client-request-id=Z3VpZG8uYnJvY2tzY2htaWR0QHNvbHZheWE9 Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://belleclick.com/guidr7Pa7Xbrr7PB8xksB8xhmidtq0Hsr7Plvaya=
HTTP 302
http://prettynbitchy.com/auth/?client-request-id=Z3VpZG8uYnJvY2tzY2htaWR0QHNvbHZheWE9 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
prettynbitchy.com/auth/ Redirect Chain
|
5 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CookieAuth.css
prettynbitchy.com/auth/ |
78 KB 78 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logon.js
prettynbitchy.com/auth/ |
18 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.png
prettynbitchy.com/auth/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
solvaya=
logo.clearbit.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| onld function| chkCookies function| ldCookie function| clkExp function| clkExp2 function| clkExp3 function| clkExp4 function| shw function| hd function| checkSubmit function| clkLgn function| clkSubmit function| clkLgn_new function| clkSec function| clkBsc function| clkChpwd function| optClkSec function| clkPin function| clkRtry function| gbid function| getUser number| a_fGzpEnbl number| g_fFcs function| window_onload1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
prettynbitchy.com/ | Name: PHPSESSID Value: 872211aa38da0907231c6baa908c54c0 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
belleclick.com
logo.clearbit.com
prettynbitchy.com
13.32.99.36
162.0.209.119
209.182.195.29
bf9a7d642c3575e7e97964c6879f2b0df69bbe506c78524b500ab8ae1fa288da
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b
df10aaecad98ca013f5e713e5a8e8c14b9cee2ec28c673dbe54990a40263093a
e2edd1c0ce07b5199dca81995c0fb2a7d514c1ec8963c1f29c80b59c9de0e94e
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855