![](/screenshots/a51c05dc-4eba-444e-be9b-ea7085db1b71.png)
jfjoutmonitor.w3spaces.com
Open in
urlscan Pro
2600:9000:2156:7a00:b:df74:43c0:93a1
Malicious Activity!
Public Scan
Submission: On March 15 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Amazon on August 10th 2021. Valid for: a year.
This is the only time jfjoutmonitor.w3spaces.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2600:9000:215... 2600:9000:2156:7a00:b:df74:43c0:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
5 | 1 |
ASN16509 (AMAZON-02, US)
jfjoutmonitor.w3spaces.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
w3spaces.com
jfjoutmonitor.w3spaces.com |
279 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | jfjoutmonitor.w3spaces.com |
jfjoutmonitor.w3spaces.com
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.w3spaces.com Amazon |
2021-08-10 - 2022-09-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://jfjoutmonitor.w3spaces.com/
Frame ID: 93DD5EAF9F9B042B4C7AEAA9F1B21A6F
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jfjoutmonitor.w3spaces.com/ |
943 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
jfjoutmonitor.w3spaces.com/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
king.png
jfjoutmonitor.w3spaces.com/ |
763 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
scripts.js
jfjoutmonitor.w3spaces.com/ |
40 B 468 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.jpg
jfjoutmonitor.w3spaces.com/ |
273 KB 274 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jfjoutmonitor.w3spaces.com
2600:9000:2156:7a00:b:df74:43c0:93a1
0b9ac437a33ef21f1fb1d28cfdb2c8f484bc3a097313ff7ff734f616921a6cef
315531e05e0faf33befb1939662f3f0dd1e04174360f67397dea159b70748a02
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f
a21e82796ce6fafb1c0d9ece004838bfa4ebfe914a66d7a34047b115d06f1c9d
fce2b1dbf13d4394758128c2d8641ae69d3b80bcc15df3a29375b6492be3a47f