![](/screenshots/427edc65-d8c9-4ef5-abfd-28838f6cca96.png)
rzowbflicpqjmxky.z13.web.core.windows.net
Open in
urlscan Pro
20.209.53.196
Malicious Activity!
Public Scan
Submission: On February 28 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Microsoft Azure TLS Issuing CA 02 on December 13th 2023. Valid for: 7 months.
This is the only time rzowbflicpqjmxky.z13.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
28 | 20.209.53.196 20.209.53.196 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 217.20.112.104 217.20.112.104 | 28753 (LEASEWEB-...) (LEASEWEB-DE-FRA-10) | |
4 | 188.114.96.3 188.114.96.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
33 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
rzowbflicpqjmxky.z13.web.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
28 |
windows.net
rzowbflicpqjmxky.z13.web.core.windows.net |
1 MB |
3 |
cdn-js.xyz
cdn-js.xyz — Cisco Umbrella Rank: 143517 |
12 KB |
1 |
userstatics.com
userstatics.com — Cisco Umbrella Rank: 176646 |
720 B |
1 |
rdtk.io
m03lm.rdtk.io |
|
33 | 4 |
Domain | Requested by | |
---|---|---|
28 | rzowbflicpqjmxky.z13.web.core.windows.net |
rzowbflicpqjmxky.z13.web.core.windows.net
|
3 | cdn-js.xyz |
rzowbflicpqjmxky.z13.web.core.windows.net
cdn-js.xyz |
1 | userstatics.com |
rzowbflicpqjmxky.z13.web.core.windows.net
|
1 | m03lm.rdtk.io |
rzowbflicpqjmxky.z13.web.core.windows.net
|
33 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure TLS Issuing CA 02 |
2023-12-13 - 2024-06-27 |
7 months | crt.sh |
*.rdtk.io GoGetSSL RSA DV CA |
2023-07-19 - 2024-07-19 |
a year | crt.sh |
cdn-js.xyz GTS CA 1P5 |
2024-02-26 - 2024-05-26 |
3 months | crt.sh |
userstatics.com E1 |
2024-01-29 - 2024-04-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rzowbflicpqjmxky.z13.web.core.windows.net/?bcda=1-888-632-0151
Frame ID: 38F4DBD6EB94E8AB6911D8632A70231A
Requests: 33 HTTP requests in this frame
Screenshot
![](/screenshots/427edc65-d8c9-4ef5-abfd-28838f6cca96.png)
Detected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
33 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
rzowbflicpqjmxky.z13.web.core.windows.net/ |
23 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
rzowbflicpqjmxky.z13.web.core.windows.net/css/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
rzowbflicpqjmxky.z13.web.core.windows.net/css/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg1.jpg
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
452 KB 452 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg2.jpg
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
452 KB 452 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
postback
m03lm.rdtk.io/ |
0 0 |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
minimize.jpg
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kxFy-clip.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
542 B 912 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qsbs-firewall.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
920 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s-S4-acc.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
813 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Z5BR-network.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
607 B 977 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uZbx-si.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
-EBq-current.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nOxp-sett.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
463 B 833 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cross.png
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
321 B 321 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
rzowbflicpqjmxky.z13.web.core.windows.net/images/ |
321 B 321 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
rzowbflicpqjmxky.z13.web.core.windows.net/js/ |
83 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
rzowbflicpqjmxky.z13.web.core.windows.net/js/ |
59 KB 59 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
rzowbflicpqjmxky.z13.web.core.windows.net/js/ |
1 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
rzowbflicpqjmxky.z13.web.core.windows.net/js/ |
464 B 840 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code
cdn-js.xyz/ |
44 KB 11 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Fm7-alert.mp3
rzowbflicpqjmxky.z13.web.core.windows.net/media/ |
196 KB 197 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
speech.mp3
rzowbflicpqjmxky.z13.web.core.windows.net/media/ |
0 0 |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Fm7-alert.mp3
rzowbflicpqjmxky.z13.web.core.windows.net/ |
321 B 0 |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtr
cdn-js.xyz/ |
53 B 449 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4UabrENHsxJlGDuGo1OIlLU94YtzCwY.woff2
rzowbflicpqjmxky.z13.web.core.windows.net/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
rzowbflicpqjmxky.z13.web.core.windows.net/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
userstatics.com/get/ |
133 B 720 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
rzowbflicpqjmxky.z13.web.core.windows.net/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
png
cdn-js.xyz/ |
358 B 718 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff
rzowbflicpqjmxky.z13.web.core.windows.net/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.ttf
rzowbflicpqjmxky.z13.web.core.windows.net/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)97 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| jkdhasjkhdgwqhgehkqgweyuodq string| bcda function| $ function| jQuery object| bootstrap function| startScan function| playSound function| _hs_getqs function| _hs_setData function| _hs_getData string| ipname_temp string| _hs_uniqueid_temp number| _hs_gdpr_diag function| _hs_checkGDPR string| _hs_bat object| _hs_sysbat string| _hs_adplug string| _hs_a_uid number| _hs_navigator_touchpoints function| _hs_readAdplugin function| _hs_readBattery function| _HSTracker number| _HS_jquery_injected number| HSTracked number| ChatDiv undefined| _HS_body undefined| _HS_html undefined| _HS_dhh undefined| hstc undefined| hstcs undefined| htssc function| _hs_getParmFromHash function| getScript object| hsutube number| hsytindex object| hsutbarr object| hsplayerArray object| hitsteps number| hs_idleTime number| hs_idle number| hs_idles number| hs_timed function| _hsni_addListener function| _hsni_get_href function| _hsni_get_parent function| _hsni_get_target function| _hsni_trackAlinks function| _hsni_noIdle function| _hsni_Idle function| _hsni_mnoIdle function| hs_CheckInactivity function| onYouTubePlayerReady function| onYouTubeIframeAPIReady function| _hs_elementor_video_overlay function| _hs_hash_changed number| aid number| sid string| _hs_api_code_public string| hs_lang number| hs_enable_form number| _hs_noyoutubeapi number| _hs_heatmap_allowed number| _hs_pre_compliance string| _hs_gdpr_compliance_txt string| _hs_gdpr_btn_yes string| _hs_gdpr_btn_no function| _hs_a_giveMeRandom function| _hs_a_readCookie function| _hs_a_writeCookie function| _hs_a_setVal function| _hs_a_getVal function| _hs_bt_toTime object| prm number| nochat number| _hs_youtubeapiloaded number| hs_pingcount number| _hs_gdpr number| _hs_png_timeout object| img string| hs_rev string| hs_goal string| mysearch string| MySearch string| tag string| Tag string| label string| IPname string| ipname string| _hs_uniqueid string| _hs_integrity string| _hs_last_full_url string| uaddress string| utitle string| uref string| new_url object| battery string| idname4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rzowbflicpqjmxky.z13.web.core.windows.net/ | Name: PHPREFS Value: full |
|
cdn-js.xyz/ | Name: user_country Value: de |
|
rzowbflicpqjmxky.z13.web.core.windows.net/ | Name: _HS_temp_id Value: nz8j2o5nq5 |
|
cdn-js.xyz/ | Name: PHPSESSID Value: r9s30av7rdmud2rbfogsfqf1v1 |
15 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn-js.xyz
m03lm.rdtk.io
rzowbflicpqjmxky.z13.web.core.windows.net
userstatics.com
188.114.96.3
20.209.53.196
217.20.112.104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