ajseng.com
Open in
urlscan Pro
72.249.68.129
Malicious Activity!
Public Scan
Effective URL: https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/?sslchannel=true&sessionid=egrV3Pt...
Submission: On June 11 via manual from CA
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 11th 2019. Valid for: 3 months.
This is the only time ajseng.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 192.185.113.200 192.185.113.200 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
2 10 | 72.249.68.129 72.249.68.129 | 36024 (AS-TIERP-...) (AS-TIERP-36024 - TierPoint) | |
3 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
12 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 192-185-113-200.unifiedlayer.com
zeorm.com |
ASN36024 (AS-TIERP-36024 - TierPoint, LLC, US)
PTR: wanted.vivawebhost.com
ajseng.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
ASN15169 (GOOGLE - Google LLC, US)
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
ajseng.com
2 redirects
ajseng.com |
202 KB |
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
47 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
zeorm.com
1 redirects
zeorm.com |
107 B |
12 | 4 |
Domain | Requested by | |
---|---|---|
10 | ajseng.com |
2 redirects
ajseng.com
|
3 | maxcdn.bootstrapcdn.com |
ajseng.com
|
1 | ajax.googleapis.com |
ajseng.com
|
1 | zeorm.com | 1 redirects |
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ajseng.com Let's Encrypt Authority X3 |
2019-06-11 - 2019-09-09 |
3 months | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-05-21 - 2019-08-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/?sslchannel=true&sessionid=egrV3PtPHiM1WtKNr6JzwejlaWC1NRt17VXaKq0rJMtFgetIkchQrAbCxODkF7mN2jYMKYetLI92WCKh
Frame ID: 51F32D448BF96F80B4734BA415D65E39
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://zeorm.com/furtherglobal
HTTP 301
https://ajseng.com/venn-furtherglobal/ HTTP 302
https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457 HTTP 301
https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/ Page URL
- https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/?sslchannel=tr... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://zeorm.com/furtherglobal
HTTP 301
https://ajseng.com/venn-furtherglobal/ HTTP 302
https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457 HTTP 301
https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/ Page URL
- https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/?sslchannel=true&sessionid=egrV3PtPHiM1WtKNr6JzwejlaWC1NRt17VXaKq0rJMtFgetIkchQrAbCxODkF7mN2jYMKYetLI92WCKh Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://zeorm.com/furtherglobal HTTP 301
- https://ajseng.com/venn-furtherglobal/ HTTP 302
- https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457 HTTP 301
- https://ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/ Redirect Chain
|
200 B 227 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.min.css
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/app/ |
152 KB 154 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro.png
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/app/ |
367 B 421 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office.png
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/app/ |
40 KB 40 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
processing-transparent-v3.gif
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/app/ |
932 B 1017 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ITCFrankGothForAMPF-Md.ttf
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyphicons-halflings-regular.woff2
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/fonts/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ITCFrankGothForAMPF-Bk.ttf
ajseng.com/venn-furtherglobal/UKJCIAOSJDJkksdMMS/customer-IDPP00C457/app/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
ajseng.com
maxcdn.bootstrapcdn.com
zeorm.com
192.185.113.200
209.197.3.15
2a00:1450:4001:81f::200a
72.249.68.129
16e7a5c1cb132ba234167757e997028703acc2d25a962ef6a4cbdcb999b3e5e1
3ec94c6730b5fe96296305e81d6c8400e85508b5da47d8a4b2b348682599119c
53964478a7c634e8dad34ecc303dd8048d00dce4993906de1bacf67f663486ef
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
dd9c2fc604a935ca8022d42b88642a8a2fb1dee113d045ec70f5f9b240d1e6e5
e0638c84b38679c21f3c3569e4f031372169943be8954ea04cfd49815b7ce69f
f28733b7bb243ca46b88ace8efe0a69f40bbfdb06b179803ea030be1b84db3f4
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c
fe185d11a49676890d47bb783312a0cda5a44c4039214094e7957b4c040ef11c