lfs.edu.pk
Open in
urlscan Pro
162.219.248.153
Malicious Activity!
Public Scan
Submission: On August 22 via automatic, source phishtank
Summary
This is the only time lfs.edu.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 162.219.248.153 162.219.248.153 | 33494 (IHNET) (IHNET - IHNetworks) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:29f::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 2 |
ASN33494 (IHNET - IHNetworks, LLC, US)
PTR: mail153.brewers.unisonplatform.com
lfs.edu.pk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
lfs.edu.pk
lfs.edu.pk |
101 KB |
2 |
gfx.ms
auth.gfx.ms |
416 B |
7 | 2 |
Domain | Requested by | |
---|---|---|
5 | lfs.edu.pk |
lfs.edu.pk
|
2 | auth.gfx.ms |
lfs.edu.pk
|
7 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
login.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
msagfx.live.com Microsoft IT TLS CA 2 |
2019-06-13 - 2021-06-13 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/verification.php
Frame ID: 32ED33D5287CA2FF7BA127D3A06CBF72
Requests: 6 HTTP requests in this frame
Frame:
http://lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/files/prefetch.html
Frame ID: 508CB3C9C6125A69425D023830843DE1
Requests: 1 HTTP requests in this frame
4 Outgoing links
These are links going to different origins than the main page.
Title: Forgot my password
Search URL Search Domain Scan URL
Title: Sign in with a different Microsoft account
Search URL Search Domain Scan URL
Title: Terms of Use
Search URL Search Domain Scan URL
Title: Privacy & Cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
verification.php
lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/ |
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged1033.css
lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/files/ |
85 KB 85 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account_msa.svg
lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/files/ |
379 B 692 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.html
lfs.edu.pk/css/wp-includes/wp-config/po-admin/proposal/files/ Frame 508C |
315 B 582 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
auth.gfx.ms/16.000.27457.4/images/Backgrounds/ |
0 208 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.27457.4/images/Backgrounds/ |
0 208 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| empty1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
lfs.edu.pk/ | Name: PHPSESSID Value: 9lab1lo43cvf4i853rqv6rgmr3 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=63072000; includeSubdomains; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
lfs.edu.pk
162.219.248.153
2a02:26f0:6c00:29f::34ef
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0df34b37d2d23a2a5056ac368248444c36789c9f71b7e15c13e056b722f335ff
2558ad9f798025d5031e64884415493d46f29d5ffaafac8db7b77fb6ce53dc8b
34d8da073f47030ee94b99d84fbe68e3345bd8aaa37ea909ff2da00238447486
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855