www.my-1passwordc.com Open in urlscan Pro
194.31.9.4  Malicious Activity! Public Scan

URL: https://www.my-1passwordc.com/
Submission: On August 27 via manual from US — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 194.31.9.4, located in Hong Kong and belongs to HYPERGUARD-AS, NL. The main domain is www.my-1passwordc.com.
TLS certificate: Issued by R3 on August 25th 2022. Valid for: 3 months.
This is the only time www.my-1passwordc.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: 1Password (Online)

Community Verdicts: Malicious2 votes Show Verdicts

Domain & IP information

IP Address AS Autonomous System
1 194.31.9.4 211343 (HYPERGUAR...)
1 2001:4de0:ac1... 20446 (STACKPATH...)
2 3
Apex Domain
Subdomains
Transfer
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 615
30 KB
1 my-1passwordc.com
www.my-1passwordc.com
161 KB
2 2
Domain Requested by
1 code.jquery.com www.my-1passwordc.com
1 www.my-1passwordc.com
2 2

This site contains no links.

Subject Issuer Validity Valid
my-1passwordc.com
R3
2022-08-25 -
2022-11-23
3 months crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2022-08-03 -
2023-07-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.my-1passwordc.com/
Frame ID: 932202658E46610B01C28F0C048B86BF
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

2
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

192 kB
Transfer

1176 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.my-1passwordc.com/
1 MB
161 KB
Document
General
Full URL
https://www.my-1passwordc.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
194.31.9.4 , Hong Kong, ASN211343 (HYPERGUARD-AS, NL),
Reverse DNS
Software
nginx/1.22.0 / PHP/7.3.31-1~deb10u1
Resource Hash
2767593f9035821c0942b4861912154b4e5ae15d3e9d0e22cc9c72adde484c95

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Sat, 27 Aug 2022 01:22:02 GMT
Server
nginx/1.22.0
Transfer-Encoding
chunked
Vary
Accept-Encoding
X-Powered-By
PHP/7.3.31-1~deb10u1
jquery-3.6.0.min.js
code.jquery.com/
87 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: www.my-1passwordc.com
URL: https://www.my-1passwordc.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:2b , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

Referer
https://www.my-1passwordc.com/
Origin
https://www.my-1passwordc.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36

Response headers

date
Sat, 27 Aug 2022 01:22:02 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-15d9d"
vary
Accept-Encoding
x-hw
1661563322.dop154.fr8.t,1661563322.cds012.fr8.hn,1661563322.cds144.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30875
truncated
/
333 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
204ae24d0b9c95793fd4a50dcd57431232686f301d2a3fe3cd90dc85fc7228f6

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7527e1b5dc4e8da48186a4c49bdc8f0562fd2a58ad5fce6ddab316aa4d75eb2

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
59c9e16c52a50c59a22b8a3aef3a98ff5744ef6e60576ec307e788fb5905596e

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment


Malicious page.domain
Submitted on August 27th 2022, 1:24:55 am UTC — From United States

Threats: Phishing Brand Impersonation
Comment: Phishing site attempting to impersonate a 1Password vault login page

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: 1Password (Online)

12 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| savepage_ShadowLoader function| check

0 Cookies