9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com Open in urlscan Pro
198.54.126.165  Malicious Activity! Public Scan

Submitted URL: http://9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com/
Effective URL: http://9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com/
Submission: On June 20 via manual from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 198.54.126.165, located in United States and belongs to NAMECHEAP-NET, US. The main domain is 9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com.
This is the only time 9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 198.54.126.165 22612 (NAMECHEAP...)
1 2
Apex Domain
Subdomains
Transfer
1 3coloursrgb.com
9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com
7 KB
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com/
Frame ID: F635D66BB2D97B331A6E2DFDFA4495AB
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

7 kB
Transfer

42 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com/
37 KB
7 KB
Document
General
Full URL
http://9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com/
Protocol
HTTP/1.1
Server
198.54.126.165 , United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server126-1.web-hosting.com
Software
LiteSpeed /
Resource Hash
9cac1676fa69818dfc65d8d18113f1fa842016a35ba5d941d87adf3ac655c931

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.115 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
content-encoding
gzip
content-length
6983
content-type
text/html
date
Mon, 20 Jun 2022 14:14:48 GMT
keep-alive
timeout=5, max=100
last-modified
Mon, 20 Jun 2022 07:16:16 GMT
server
LiteSpeed
vary
Accept-Encoding
x-turbo-charged-by
LiteSpeed
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a00f7ed35be5bfea9cbbdcbeca07f536d9db6fb6391ca55ad38790eecb01ffeb

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.115 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| load

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

9cf8a9bb1533d24bafb63b2e977512d3.3coloursrgb.com
198.54.126.165
9cac1676fa69818dfc65d8d18113f1fa842016a35ba5d941d87adf3ac655c931
a00f7ed35be5bfea9cbbdcbeca07f536d9db6fb6391ca55ad38790eecb01ffeb