URL: http://adb1y.com/file/files/picker_account_aad.svg?x=9de70d1c5191d1852a0d5aac28b44a6c
Submission: On May 10 via manual from AE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 68.65.123.52, located in Los Angeles, United States and belongs to NAMECHEAP-NET, US. The main domain is adb1y.com.
This is the only time adb1y.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 68.65.123.52 22612 (NAMECHEAP...)
1 1
Apex Domain
Subdomains
Transfer
1 adb1y.com
adb1y.com
631 B
1 1
Domain Requested by
1 adb1y.com
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://adb1y.com/file/files/picker_account_aad.svg?x=9de70d1c5191d1852a0d5aac28b44a6c
Frame ID: 2069F3F8EE4CC702C5A5179AEAECBCDA
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request picker_account_aad.svg
adb1y.com/file/files/
756 B
631 B
Document
General
Full URL
http://adb1y.com/file/files/picker_account_aad.svg?x=9de70d1c5191d1852a0d5aac28b44a6c
Protocol
HTTP/1.1
Server
68.65.123.52 Los Angeles, United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
premium73-5.web-hosting.com
Software
Apache /
Resource Hash
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69

Request headers

Host
adb1y.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 10 May 2020 10:24:32 GMT
Server
Apache
Last-Modified
Wed, 02 Aug 2017 16:37:40 GMT
Accept-Ranges
bytes
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
394
Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adb1y.com
68.65.123.52
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69