wwww-linkedin.com
Open in
urlscan Pro
64.191.166.198
Malicious Activity!
Public Scan
Effective URL: https://wwww-linkedin.com/
Submission Tags: @phishunt_io
Submission: On July 06 via api from DE — Scanned from NL
Summary
TLS certificate: Issued by R3 on July 1st 2022. Valid for: 3 months.
This is the only time wwww-linkedin.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Phishing Simulation (Internet)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 51.105.164.234 51.105.164.234 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
3 | 2a02:26f0:170... 2a02:26f0:1700:d::1737:6e8f | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
5 | 64.191.166.198 64.191.166.198 | 13776 (QX-NET-ASN-1) (QX-NET-ASN-1) | |
9 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
wwww-linkedin.com.admin-mcas-df.ms |
ASN20940 (AKAMAI-ASN1, NL)
mcasproxy.azureedge.net |
ASN13776 (QX-NET-ASN-1, US)
PTR: landing.phishingbox.com
wwww-linkedin.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
wwww-linkedin.com
wwww-linkedin.com |
282 KB |
3 |
azureedge.net
mcasproxy.azureedge.net — Cisco Umbrella Rank: 56145 |
50 KB |
1 |
admin-mcas-df.ms
wwww-linkedin.com.admin-mcas-df.ms |
890 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
5 | wwww-linkedin.com |
wwww-linkedin.com
|
3 | mcasproxy.azureedge.net |
wwww-linkedin.com.admin-mcas-df.ms
mcasproxy.azureedge.net |
1 | wwww-linkedin.com.admin-mcas-df.ms | |
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mcas.ms Microsoft Azure TLS Issuing CA 06 |
2022-07-06 - 2023-07-01 |
a year | crt.sh |
*.azureedge.net Microsoft RSA TLS CA 01 |
2021-10-28 - 2022-10-28 |
a year | crt.sh |
wwww-linkedin.com R3 |
2022-07-01 - 2022-09-29 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://wwww-linkedin.com/
Frame ID: 8F692DBA1CAC0BA4048A3EE9F594C1C9
Requests: 7 HTTP requests in this frame
Frame:
https://mcasproxy.azureedge.net/proxyweb/1.17.40/html/session-context-restore.html
Frame ID: DE9E6F8C35D2F6D0F0FBDBC4E4FED312
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Phishing Simulation Landing PagePage URL History Show full URLs
- https://wwww-linkedin.com.admin-mcas-df.ms/ Page URL
- https://wwww-linkedin.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://wwww-linkedin.com.admin-mcas-df.ms/ Page URL
- https://wwww-linkedin.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
wwww-linkedin.com.admin-mcas-df.ms/ |
1 KB 890 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
session-context-store-helper.min.js
mcasproxy.azureedge.net/proxyweb/1.17.40/js/ |
7 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
session-context-restore.html
mcasproxy.azureedge.net/proxyweb/1.17.40/html/ Frame DE9E |
281 B 730 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
session-context-restore.min.js
mcasproxy.azureedge.net/proxyweb/1.17.40/js/ Frame DE9E |
40 KB 41 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
wwww-linkedin.com/ |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
wwww-linkedin.com/assets/css/ |
143 KB 143 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
phishingbox_logo.png
wwww-linkedin.com/assets/img/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
wwww-linkedin.com/assets/js/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
wwww-linkedin.com/assets/js/ |
36 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Phishing Simulation (Internet)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mcasproxy.azureedge.net
wwww-linkedin.com
wwww-linkedin.com.admin-mcas-df.ms
2a02:26f0:1700:d::1737:6e8f
51.105.164.234
64.191.166.198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