miseajourrequises.ddns.net
Open in
urlscan Pro
62.210.53.40
Malicious Activity!
Public Scan
Effective URL: https://miseajourrequises.ddns.net/service/
Submission: On November 08 via api from BE
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on November 8th 2019. Valid for: 3 months.
This is the only time miseajourrequises.ddns.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.35 167.89.118.35 | 11377 (SENDGRID) (SENDGRID - SendGrid) | |
1 1 | 67.199.248.11 67.199.248.11 | 396982 (GOOGLE-PR...) (GOOGLE-PRIVATE-CLOUD - Google LLC) | |
9 | 62.210.53.40 62.210.53.40 | 12876 (Online SAS) (Online SAS) | |
9 | 1 |
ASN11377 (SENDGRID - SendGrid, Inc., US)
PTR: o16789118x35.outbound-mail.sendgrid.net
u7025023.ct.sendgrid.net |
ASN396982 (GOOGLE-PRIVATE-CLOUD - Google LLC, US)
PTR: bit.ly
bit.ly |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
ddns.net
miseajourrequises.ddns.net |
282 KB |
1 |
bit.ly
1 redirects
bit.ly |
357 B |
1 |
sendgrid.net
1 redirects
u7025023.ct.sendgrid.net |
232 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
9 | miseajourrequises.ddns.net |
miseajourrequises.ddns.net
|
1 | bit.ly | 1 redirects |
1 | u7025023.ct.sendgrid.net | 1 redirects |
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
miseajourrequises.ddns.net Let's Encrypt Authority X3 |
2019-11-08 - 2020-02-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://miseajourrequises.ddns.net/service/
Frame ID: 123649E6EFD891CFC912959F69215D16
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u7025023.ct.sendgrid.net/wf/click?upn=PR2n7-2FUQONBvGMcLq6XJ2v5cG5h2AyUQjAOe6oDsRbs-3D_3SkXI7-2B0PDDe...
HTTP 302
http://bit.ly/2NqD25c HTTP 301
https://miseajourrequises.ddns.net/service/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u7025023.ct.sendgrid.net/wf/click?upn=PR2n7-2FUQONBvGMcLq6XJ2v5cG5h2AyUQjAOe6oDsRbs-3D_3SkXI7-2B0PDDezyahtcZBWaz2-2B0v2Cy4GrSEjNufDBZUZfB9Sj7z6xGUm61A0i8Isa4pqKCno0waDu3VAdrox2qysyEtdjI-2FjCiZYv8YG4hEk721w5yDJbpDRDbb3uRiR-2BrB90SjhR8xzUCPzPKrremShRtjPohOIEDlJscwDzkFIWNUm9EdZEwQqqB1wCr5HU6qcFthJ6flpPWhcIkIIJF5Tn7L9z8jo7YwOmO-2FVrb4-3D
HTTP 302
http://bit.ly/2NqD25c HTTP 301
https://miseajourrequises.ddns.net/service/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
miseajourrequises.ddns.net/service/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
normalize.css
miseajourrequises.ddns.net/service/css/ |
8 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
miseajourrequises.ddns.net/service/css/ |
118 KB 119 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
miseajourrequises.ddns.net/service/css/ |
21 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
miseajourrequises.ddns.net/service/css/ |
5 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ppt.PNG
miseajourrequises.ddns.net/service/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.11.3.min.js
miseajourrequises.ddns.net/service/js/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
miseajourrequises.ddns.net/service/js/ |
36 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
plugins.js
miseajourrequises.ddns.net/service/js/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
miseajourrequises.ddns.net/ | Name: PHPSESSID Value: 5itlgi8433fjfi9g7v4idl86m3 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bit.ly
miseajourrequises.ddns.net
u7025023.ct.sendgrid.net
167.89.118.35
62.210.53.40
67.199.248.11
0a83ae246882910440cc1873ad058cef59425cdbbdd8debcd6ce787262780838
0fb1bbca73646e8e2b93c82e8d8b219647b13d4b440c48e338290b9a685b8de1
123a1d5f92b2744c003a176eb36ebcb867e8c46d6bea590ebccf57cac45d4f45
30956198f3f7ad95a65a31f44304a35f639917b4b7f7fdea4622b9549c037cd0
4fe68fa216176e6d1f4580e924bafecc9f519984ecc06b1a840a08b0d88c95de
53964478a7c634e8dad34ecc303dd8048d00dce4993906de1bacf67f663486ef
67ff057eba689804cd290df4591a339ff3c17f98a4a80297f2acc4dfa2047f79
c13ab36ef47c80231ddd9e6774f9ada731e439a298e4a3471ad347cf5e4f36b5
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c