jpn4-secondary.z26.web.core.windows.net
Open in
urlscan Pro
20.60.182.142
Malicious Activity!
Public Scan
Effective URL: https://jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-87764-30682
Submission: On March 19 via api from JP — Scanned from AU
Summary
TLS certificate: Issued by Microsoft Azure TLS Issuing CA 06 on February 13th 2024. Valid for: 4 months.
This is the only time jpn4-secondary.z26.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
26 | 20.60.182.142 20.60.182.142 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 45.77.171.75 45.77.171.75 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 172.67.208.186 172.67.208.186 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
28 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
jpn4-secondary.z26.web.core.windows.net |
ASN20473 (AS-CHOOPA, US)
PTR: 45.77.171.75.vultrusercontent.com
m03lm.rdtk.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
windows.net
jpn4-secondary.z26.web.core.windows.net |
2 MB |
1 |
userstatics.com
userstatics.com — Cisco Umbrella Rank: 218169 |
718 B |
1 |
rdtk.io
m03lm.rdtk.io |
|
28 | 3 |
Domain | Requested by | |
---|---|---|
26 | jpn4-secondary.z26.web.core.windows.net |
jpn4-secondary.z26.web.core.windows.net
|
1 | userstatics.com |
jpn4-secondary.z26.web.core.windows.net
|
1 | m03lm.rdtk.io |
jpn4-secondary.z26.web.core.windows.net
|
28 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure TLS Issuing CA 06 |
2024-02-13 - 2024-06-27 |
4 months | crt.sh |
*.rdtk.io GoGetSSL RSA DV CA |
2023-07-19 - 2024-07-19 |
a year | crt.sh |
userstatics.com E1 |
2024-01-29 - 2024-04-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-87764-30682
Frame ID: 61457A9B03F8D6690F25CF3BD93CA193
Requests: 28 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://jpn4-secondary.z26.web.core.windows.net/?bcda=%280101%29-87764-30682 Page URL
- https://jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-87764-30682 Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://jpn4-secondary.z26.web.core.windows.net/?bcda=%280101%29-87764-30682 Page URL
- https://jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-87764-30682 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
jpn4-secondary.z26.web.core.windows.net/ |
1 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/ |
23 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/css/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/css/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg1.jpg
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
537 KB 537 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg2.jpg
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
452 KB 452 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
postback
m03lm.rdtk.io/ |
0 0 |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
minimize.jpg
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kxFy-clip.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
542 B 912 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qsbs-firewall.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
920 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s-S4-acc.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
813 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Z5BR-network.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
607 B 977 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uZbx-si.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
-EBq-current.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nOxp-sett.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
463 B 833 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cross.png
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
377 KB 378 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/images/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/js/ |
83 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/js/ |
59 KB 59 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/js/ |
1 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/js/ |
464 B 840 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Fm7-alert.mp3
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/media/ |
112 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
speech.mp3
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/media/ |
340 B 699 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Fm7-alert.mp3
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4UabrENHsxJlGDuGo1OIlLU94YtzCwY.woff2
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/fonts/ |
21 KB 22 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
userstatics.com/get/ |
133 B 718 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML/fonts/ |
65 KB 65 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| jkdhasjkhdgwqhgehkqgweyuodq string| bcda function| $ function| jQuery object| bootstrap function| startScan function| playSound1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jpn4-secondary.z26.web.core.windows.net/werrx01USAHTML | Name: PHPREFS Value: full |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jpn4-secondary.z26.web.core.windows.net
m03lm.rdtk.io
userstatics.com
172.67.208.186
20.60.182.142
45.77.171.75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