microsoftwindowsapplemacscams.netlify.app
Open in
urlscan Pro
54.161.234.33
Malicious Activity!
Public Scan
Effective URL: https://microsoftwindowsapplemacscams.netlify.app/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?pho...
Submission: On July 27 via api from US — Scanned from CA
Summary
TLS certificate: Issued by DigiCert Global G2 TLS RSA SHA256 202... on January 15th 2024. Valid for: a year.
This is the only time microsoftwindowsapplemacscams.netlify.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 20 | 54.161.234.33 54.161.234.33 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 172.217.222.97 172.217.222.97 | 15169 (GOOGLE) (GOOGLE) | |
2 | 151.101.1.229 151.101.1.229 | 54113 (FASTLY) (FASTLY) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 173.194.204.100 173.194.204.100 | 15169 (GOOGLE) (GOOGLE) | |
27 | 6 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-161-234-33.compute-1.amazonaws.com
microsoftwindowsapplemacscams.netlify.app |
ASN15169 (GOOGLE, US)
PTR: qi-in-f97.1e100.net
www.googletagmanager.com |
ASN15169 (GOOGLE, US)
PTR: qb-in-f100.1e100.net
www.google-analytics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
netlify.app
1 redirects
microsoftwindowsapplemacscams.netlify.app |
228 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1832 |
73 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
31 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 410 |
49 KB |
1 |
google-analytics.com
www.google-analytics.com — Cisco Umbrella Rank: 104 |
|
1 |
googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 112 |
98 KB |
27 | 6 |
Domain | Requested by | |
---|---|---|
20 | microsoftwindowsapplemacscams.netlify.app |
1 redirects
microsoftwindowsapplemacscams.netlify.app
|
2 | maxcdn.bootstrapcdn.com |
microsoftwindowsapplemacscams.netlify.app
maxcdn.bootstrapcdn.com |
2 | cdnjs.cloudflare.com |
microsoftwindowsapplemacscams.netlify.app
|
2 | cdn.jsdelivr.net |
microsoftwindowsapplemacscams.netlify.app
|
1 | www.google-analytics.com |
www.googletagmanager.com
|
1 | www.googletagmanager.com |
microsoftwindowsapplemacscams.netlify.app
|
27 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.netlify.app DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-01-15 - 2025-02-14 |
a year | crt.sh |
*.google-analytics.com WR2 |
2024-07-01 - 2024-09-23 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
cdnjs.cloudflare.com E1 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-07-23 - 2024-10-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://microsoftwindowsapplemacscams.netlify.app/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-60...~3...~311~...am...~311~....ams/werrx01/?phone=%201-604-37/
Frame ID: 1F9CDAA67ACA8063AF9579D16303FCAA
Requests: 27 HTTP requests in this frame
Screenshot
Page Title
Security Center Code0x268d3 ServicesPage URL History Show full URLs
-
https://microsoftwindowsapplemacscams.netlify.app/scams/werrx01?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777...
HTTP 301
https://microsoftwindowsapplemacscams.netlify.app/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-677... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Netlify (Web Servers) Expand
Detected patterns
- ^https?://[^/]+\.netlify\.(?:com|app)/
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Analytics (Analytics) Expand
Detected patterns
Google Tag Manager (Tag Managers) Expand
Detected patterns
- googletagmanager\.com/gtag/js
Modernizr (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://microsoftwindowsapplemacscams.netlify.app/scams/werrx01?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-60...~3...~311~...am...~311~....ams/werrx01/?phone=%201-604-37/
HTTP 301
https://microsoftwindowsapplemacscams.netlify.app/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-604-373-6777/scams/werrx01/?phone=%201-60...~3...~311~...am...~311~....ams/werrx01/?phone=%201-604-37/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ Redirect Chain
|
36 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js
www.googletagmanager.com/gtag/ |
289 KB 98 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@4.6.0/dist/css/ |
158 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
82 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
12 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/ |
27 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg2.jpg
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
111 KB 111 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
minimize.jpg
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
setting.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
364 B 450 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
que.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
349 B 435 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
virus-scan.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bell.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pc.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
def.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cross.png
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
virus-images.jpg
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
8 KB 8 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
modernizr.min.js
cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@4.6.0/dist/js/ |
82 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fullscreen.js
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
245 B 364 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
before.js
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
366 B 452 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
light.js
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
503 B 589 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0wa0rni0ng0.mp3
microsoftwindowsapplemacscams.netlify.app/scams/werrx01/ |
8 KB 8 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
collect
www.google-analytics.com/g/ |
0 0 |
Fetch
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
microsoftwindowsapplemacscams.netlify.app/ |
3 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.5.0/fonts/ |
65 KB 66 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| gtag object| dataLayer function| $ function| jQuery function| getVariableFromURl string| phone string| phone_number object| html5 object| Modernizr object| bootstrap function| addEvent object| google_tag_manager object| google_tag_data function| onYouTubeIframeAPIReady object| gaGlobal2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.microsoftwindowsapplemacscams.netlify.app/ | Name: _ga_GZ2WHBX513 Value: GS1.1.1722104960.1.0.1722104960.0.0.0 |
|
.microsoftwindowsapplemacscams.netlify.app/ | Name: _ga Value: GA1.1.473289712.1722104960 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
cdnjs.cloudflare.com
maxcdn.bootstrapcdn.com
microsoftwindowsapplemacscams.netlify.app
www.google-analytics.com
www.googletagmanager.com
104.17.24.14
104.18.10.207
151.101.1.229
172.217.222.97
173.194.204.100
54.161.234.33
0589be7715d2320e559eae6bd26f3528e97450c70293da2e1e8ce45f77f99ab1
2051d61446d4dbffb03727031022a08c84528ab44d203a7669c101e5fbdd5515
2e48fef820929c21295e13444901f60e3aed61ba6f8c773ff1466e6843e76b49
31681779c6f394370dad146169896e9ec2b8f7c716c4b1db78c459033e48bf95
316e6a6737bd296ab30aca2ef7fa36f119d15786a2432d01e31fdc130272f15c
318698ae5e67c32550d6b40ac09848d598f6317f51a8f09638ba925f6e7cc479
3821ef20f5904fdb993e34d87ff8fb9c5786a382efb0eeee8b4f00c91428b701
3b531d403dc8ce7cbb0efb1a0c307cfb2bbaaf21feaff9f3546f13bebda71887
43703d37b8fe2769cb2e12db7aa281dbcca175124d05ff4b0cc3d152534698a4
44f752b0bd2e48052d538bc6aca5379f3630ca64da945f794690ddf47e8eaef7
4ffcc598ee6cff4692c1cea272cd8a2f195f6dec32473e94370d6cdcfa5fe601
598699133be5eef63e3b9b5540609ec0dc91d7af9c7f70a3b890e57491a70ae0
69e48d9db7c27991e0dce1a56f246fec93363cc286c71e6160282a31bf05e867
733b181fd322493d5a99f4d05e17fc4b1b29e8e0dea3a226c8498f38587b3640
873e5fa4d95357a9b8395dd175abe9546cefd8982808d31fa2383e8a2a809c6b
948b1331677d0f9991d50376bfba436033c5a9cc5919cf9f74c03424b6f3e342
a05245b6f7fd752af4a7b0131bbdfdf3eaee6c5a25a81cb498e0f0759189473c
b0212543cc5a4a0a31c1b5a9d1e8973261992116b4cfde3e7dfcf33b4e81a97b
b13a03e0db893734298cbe203bf264407636ffe5dab0a141f83c492d0034dd6a
b2dc4153ee7019c70a1095d5d1304d540e3bba045d99e141f63e5b13362e5a4e
b6f7c794ee9bafa10e0a36e3875ab3f9ed95f47f375650f9bcbf4fe22b2acb5f
d2b82e612d2a812e8be2a57300dab8923c4f2edbe7a799e7da70791b595646fe
ddd92f10ad162c7449eff0acaf40598c05b1111739587edb75e5326b6697c5d5
ee4bc5fe81fa7c1e8497d79c9c8a96485df217092d334e9b48fa8840fed11d03
ff82aeed6b9bb6701696c84d1b223d2e682eb78c89117a438ce6cfea8c498995