1998528729.rsc.cdn77.org Open in urlscan Pro
195.181.175.45  Malicious Activity! Public Scan

Submitted URL: http://url1782.decoskin-app.com/ls/click?upn=1wd51q87bOQG95feY6T5uut7t07a1NI-2F4f-2BSHR7ZjMbi-2FCgY1OoemTu-2FjB4PITIzb5dWuQfkT-2...
Effective URL: https://1998528729.rsc.cdn77.org/index.html
Submission: On October 18 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 1 HTTP transactions. The main IP is 195.181.175.45, located in Frankfurt am Main, Germany and belongs to CDN77, GB. The main domain is 1998528729.rsc.cdn77.org.
TLS certificate: Issued by Let's Encrypt Authority X3 on September 22nd 2020. Valid for: 3 months.
This is the only time 1998528729.rsc.cdn77.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.115.56 11377 (SENDGRID)
1 195.181.175.45 60068 (CDN77)
1 2
Apex Domain
Subdomains
Transfer
1 cdn77.org
1998528729.rsc.cdn77.org
24 KB
1 decoskin-app.com
url1782.decoskin-app.com
276 B
1 2
Domain Requested by
1 1998528729.rsc.cdn77.org
1 url1782.decoskin-app.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
www.cdn77.com
Let's Encrypt Authority X3
2020-09-22 -
2020-12-21
3 months crt.sh

This page contains 1 frames:

Primary Page: https://1998528729.rsc.cdn77.org/index.html
Frame ID: 04AA0AE6BA0D63BF20FD5ED743EA5F87
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://url1782.decoskin-app.com/ls/click?upn=1wd51q87bOQG95feY6T5uut7t07a1NI-2F4f-2BSHR7ZjMbi-2FCgY1OoemTu-2... HTTP 302
    https://1998528729.rsc.cdn77.org/index.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^CDN77-Turbo$/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

24 kB
Transfer

91 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://url1782.decoskin-app.com/ls/click?upn=1wd51q87bOQG95feY6T5uut7t07a1NI-2F4f-2BSHR7ZjMbi-2FCgY1OoemTu-2FjB4PITIzb5dWuQfkT-2BmXAMrXnemdeyPY510h9MbYFIqUCQo3uFNF0ereU-2BI1t4Mql4MvaWYLAneG_Zf9noBSXp6zmd8gcAmse0Nb5kuZpe8PA6kpauBehZe6SpAJd0t79i1eYHyw78yZlJgwB0vL6f1GEeqzxYOpC0zDiFV1xD2iTTNaopBn7VOxlQHFHPURFIf6cX1PY2dUFZ0LP-2FgqDI65aHWPPtswkCYVoJAmo-2BAwqRJd4zeE0gK-2Bhsl6ioVFC5O18EEQGdXT-2FZfYy2uJMxSlwza1l2Knr67p63alVr6bq0v9WGCVvhec-3D HTTP 302
    https://1998528729.rsc.cdn77.org/index.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.html
1998528729.rsc.cdn77.org/
Redirect Chain
  • http://url1782.decoskin-app.com/ls/click?upn=1wd51q87bOQG95feY6T5uut7t07a1NI-2F4f-2BSHR7ZjMbi-2FCgY1OoemTu-2FjB4PITIzb5dWuQfkT-2BmXAMrXnemdeyPY510h9MbYFIqUCQo3uFNF0ereU-2BI1t4Mql4MvaWYLAneG_Zf9noBS...
  • https://1998528729.rsc.cdn77.org/index.html
43 KB
24 KB
Document
General
Full URL
https://1998528729.rsc.cdn77.org/index.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
195.181.175.45 Frankfurt am Main, Germany, ASN60068 (CDN77, GB),
Reverse DNS
frankfurt-44.cdn77.com
Software
CDN77-Turbo /
Resource Hash
45ebb1fc9965382a7ca900cdce06f317520dfd331858f0b586f8d4e3533dfb71

Request headers

:method
GET
:authority
1998528729.rsc.cdn77.org
:scheme
https
:path
/index.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sun, 18 Oct 2020 13:07:44 GMT
content-type
text/html
last-modified
Fri, 16 Oct 2020 18:58:44 GMT
etag
W/"5f89ed64-aacc"
access-control-allow-origin
*
expires
Fri, 30 Oct 2020 11:43:48 GMT
server
CDN77-Turbo
x-77-nzt
AcO1rywYTVjvrBMAAA==
x-edge-ip
195.181.175.44
x-edge-pop
frankfurtDE
x-cache
HIT
x-age
5036
content-encoding
br

Redirect headers

Server
nginx
Date
Sun, 18 Oct 2020 13:07:44 GMT
Content-Type
text/html; charset=utf-8
Content-Length
96
Connection
keep-alive
Location
https://1998528729.rsc.cdn77.org/index.html#christian.schmitz@carlyle.com
X-Robots-Tag
noindex, nofollow
truncated
/
28 KB
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
64d14471cc6ff013cc309a0c43be662723f220d78d960c3ef1903f9c5f9c5838

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
text/css
truncated
/
2 KB
0
Script
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a14d323a0dc7386e4af6c50fadc35b8e979c8e019aa0183ea696e72587ee84a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
text/javascript
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7cdef2a343a697f16fb77ccba5ad107680cd7b4c336e45024b54802481271d1

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
11 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f8593c513b145927dfff508c6e4a3c21c5e76f5003fb5c817036e4416f7888d8

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
47abb531f51079ad100757fa175a33462f038be94d918dc5db204d1be2545045

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes

0 Cookies