onlinesigin.ooguy.com
Open in
urlscan Pro
188.68.208.139
Malicious Activity!
Public Scan
Submission: On April 03 via manual from US
Summary
This is the only time onlinesigin.ooguy.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 188.68.208.139 188.68.208.139 | 49505 (SELECTEL) (SELECTEL) | |
1 | 2a00:1450:400... 2a00:1450:4001:81b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 4 | 2606:4700:30:... 2606:4700:30::681c:c75 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
4 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
zupimages.net | |
www.zupimages.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
zupimages.net
2 redirects
zupimages.net www.zupimages.net |
279 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
ooguy.com
onlinesigin.ooguy.com |
99 KB |
4 | 3 |
Domain | Requested by | |
---|---|---|
2 | www.zupimages.net |
onlinesigin.ooguy.com
|
2 | zupimages.net | 2 redirects |
1 | ajax.googleapis.com |
onlinesigin.ooguy.com
|
1 | onlinesigin.ooguy.com | |
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
sni37061.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-12 - 2019-09-18 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://onlinesigin.ooguy.com/common/oauth2/?authorize&client_id=4345a7b9-9a63-4910-a426-35363201d503&response_mode=form_post&response_type=code+id_token&scope=openid+profile&state=OpenIdConnect.AuthenticationProperties%3dFWimPB61qJuWtl5jKcoeWDuxNrzpQmA22__wBiGndTyV4Hp3AVyqL-IISngIde6GIEws60_qtldBO5qFU87CT4pjIiWVgwJwFH1zffsdlVbdA-HMip-5P0SyBNguoZl5&nonce=636832373152931089.ZWNmZWUxZmEtMmUzMC00YmY3LTg4NDktNGI3Mzc3ZWUyZGU4ZjE1NmM4NDgtMjEwYy00YWU0LTk0MGYtZmVmZDhlZTIyZWFm&redirect_uri=https%3a%2f%2fwww.office.com%2f&ui_locales=en-US&mkt=en-US&client-request-id=23c0f522-8c90-476e-b1a8-6f3ac5dd4692
Frame ID: A4EE9B354BE32C69FB781A1CAEA9CF2C
Requests: 4 HTTP requests in this frame
Screenshot
Detected technologies
CentOS (Operating Systems) ExpandDetected patterns
- headers server /CentOS/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://zupimages.net/up/18/52/1lxd.jpg HTTP 301
- https://www.zupimages.net/up/18/52/1lxd.jpg
- https://zupimages.net/up/18/52/04a6.jpg HTTP 301
- https://www.zupimages.net/up/18/52/04a6.jpg
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
onlinesigin.ooguy.com/common/oauth2/ |
99 KB 99 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1lxd.jpg
www.zupimages.net/up/18/52/ Redirect Chain
|
944 B 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
04a6.jpg
www.zupimages.net/up/18/52/ Redirect Chain
|
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
onlinesigin.ooguy.com/ | Name: PHPSESSID Value: p950sko08fjf7mj850heicedh4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
onlinesigin.ooguy.com
www.zupimages.net
zupimages.net
188.68.208.139
2606:4700:30::681c:c75
2a00:1450:4001:81b::200a
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
a0a8ca557906cf7c4be3f7ce89ca7d435756606ac06105fabe6f48f988e5ac4f
ac72a76be7afcfffccd6344d5814b7b59637e3257232ed3b70feb21ed38536d3