www.frankdfagnano.com
Open in
urlscan Pro
199.204.248.120
Malicious Activity!
Public Scan
Submission: On February 10 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on December 27th 2023. Valid for: 3 months.
This is the only time www.frankdfagnano.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 199.204.248.120 199.204.248.120 | 11989 (WEBINT) (WEBINT) | |
1 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
1 | 104.26.12.205 104.26.12.205 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 162.19.88.69 162.19.88.69 | 16276 (OVH) (OVH) | |
7 | 4 |
ASN11989 (WEBINT, US)
PTR: cp10.machighway.com
www.frankdfagnano.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
frankdfagnano.com
www.frankdfagnano.com |
257 KB |
1 |
postimg.cc
i.postimg.cc — Cisco Umbrella Rank: 19634 |
1 KB |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2829 |
156 B |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 903 |
1 KB |
7 | 4 |
Domain | Requested by | |
---|---|---|
4 | www.frankdfagnano.com |
www.frankdfagnano.com
|
1 | i.postimg.cc |
www.frankdfagnano.com
|
1 | api.ipify.org |
www.frankdfagnano.com
|
1 | aadcdn.msftauth.net |
www.frankdfagnano.com
|
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpcontacts.frankdfagnano.com R3 |
2023-12-27 - 2024-03-26 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
ipify.org GTS CA 1P5 |
2024-01-22 - 2024-04-21 |
3 months | crt.sh |
postimg.cc R3 |
2023-12-23 - 2024-03-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.frankdfagnano.com/
Frame ID: C794D115E30A1BEF3105FB732B963153
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.frankdfagnano.com/ |
646 B 973 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.4d8fcd05.js
www.frankdfagnano.com/static/js/ |
242 KB 243 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.ab849390.css
www.frankdfagnano.com/static/css/ |
9 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.564db913a7fa0ca42727161c6d031bef.svg
www.frankdfagnano.com/static/media/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
23 B 156 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
swipe.png
i.postimg.cc/x1qR9tzv/ |
884 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
api.ipify.org
i.postimg.cc
www.frankdfagnano.com
104.26.12.205
152.199.23.37
162.19.88.69
199.204.248.120
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
166cfb5f2c52cb9d0d52032fab465688fc97d07cf480a8ddb4536da7a9ef15df
2f7de4b0d26130e4dc56ea239c66f3cebf58a85f6cf7697cc400f19d3a9f5b96
58ac5cc33b7f68061aed522858e39ae608686a478f6512c99b12f166ac3b7edd
8dc9d7f2be71e0f35b358e763545085d4d35476570b64dd10f38e5884d5f3698
fc87e3f1930a326e499b8e09e2d49e3e9e6c1ab771cb7c083555dabf8b829c13