URL: https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Submission: On November 08 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 172.67.192.53, located in United States and belongs to CLOUDFLARENET, US. The main domain is msj.urj7z9q.com.
TLS certificate: Issued by WE1 on November 4th 2024. Valid for: 3 months.
This is the only time msj.urj7z9q.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Google (Online)

Domain & IP information

IP Address AS Autonomous System
2 172.67.192.53 13335 (CLOUDFLAR...)
1 2a04:4e42:200... 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
2 urj7z9q.com
msj.urj7z9q.com
20 KB
1 googleusercontent.com
blogger.googleusercontent.com — Cisco Umbrella Rank: 10512
86 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 791
31 KB
4 3
Domain Requested by
2 msj.urj7z9q.com
1 blogger.googleusercontent.com msj.urj7z9q.com
1 code.jquery.com msj.urj7z9q.com
4 3

This site contains no links.

Subject Issuer Validity Valid
urj7z9q.com
WE1
2024-11-04 -
2025-02-02
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.googleusercontent.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Frame ID: 3DFC672066925F9710179CE18C7B49DE
Requests: 5 HTTP requests in this frame

Screenshot

Page Title


Detected technologies

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

136 kB
Transfer

244 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
63 KB
19 KB
Document
General
Full URL
https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.67.192.53 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1412ff489aa03df7ca85c1540e503eb45b77eac8c9eb622e85bbe36acbbb050c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-cache, private
cf-cache-status
DYNAMIC
cf-ray
8df166eb5e77d2fa-FRA
content-encoding
zstd
content-type
text/html; charset=UTF-8
date
Fri, 08 Nov 2024 00:21:17 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FGCjEoxRh455XgK81OIpHaarKjM5RipfML9ACNPOn8IUjdME%2FKpbUY1G03rbI7NcPQOXVm0etYF3AWfnxMGFEdVQYgFshQP13hvxWrr4qEtNsCrN5claIMkZ55SQjg%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=901&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2824&recv_bytes=1455&delivery_rate=3606475&cwnd=250&unsent_bytes=0&cid=f2aa609dec38d9a6&ts=288&x=0" cfL4;desc="?proto=QUIC&rtt=9978&sent=12&recv=11&lost=0&retrans=0&sent_bytes=4186&recv_bytes=4560&delivery_rate=776&cwnd=12000&unsent_bytes=0&cid=45ac3cab7f9bc14d&ts=912&x=1" cfHdrFlush;dur=0
vary
accept-encoding
jquery-3.6.0.min.js
code.jquery.com/
87 KB
31 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: msj.urj7z9q.com
URL: https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:200::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://msj.urj7z9q.com/

Response headers

content-encoding
gzip
etag
W/"28feccc0-15d9d"
age
1007605
x-cache
HIT, HIT
date
Fri, 08 Nov 2024 00:21:19 GMT
content-type
application/javascript; charset=utf-8
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
x-cache-hits
8, 96606
x-served-by
cache-lga21931-LGA, cache-fra-etou8220050-FRA
vary
Accept-Encoding
cache-control
public, max-age=31536000, stale-while-revalidate=604800
x-timer
S1731025280.550691,VS0,VE0
cross-origin-resource-policy
cross-origin
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
access-control-allow-origin
*
content-length
30875
server
nginx
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
93eb80dc01e920eaa7f23f998f67e5a5fc55e02b8e66bd3d8f5fef097d88565f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
userinter.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZ...
86 KB
86 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png
Requested by
Host: msj.urj7z9q.com
URL: https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
fbbbc78e85dfa4f2b390e6dc2f3850d0f5247d16b5fd525093331572aa79ae84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://msj.urj7z9q.com/

Response headers

access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
etag
"v367e"
x-content-type-options
nosniff
expires
Sat, 09 Nov 2024 00:21:21 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
87859
date
Fri, 08 Nov 2024 00:21:21 GMT
x-xss-protection
0
content-type
image/png
vary
Origin
server
fife
content-disposition
inline;filename="userinter.png"
favicon.ico
msj.urj7z9q.com/
0
758 B
Other
General
Full URL
https://msj.urj7z9q.com/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.67.192.53 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/

Response headers

cache-control
max-age=14400
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-encoding
zstd
cf-cache-status
HIT
age
12753
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KK5CkX9qK%2BPOZCCV48dYjHWs%2FNeqMvPmaxRZHEfAYVX%2BtIg0Ylm37hb6tdf3b6wYyby6Ek2o9pyvVKPK09TzFW6xao2GDItfo5S0VBpEigUMzqTkk9NYQwQTvE4nkw%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8df16711bcd1d2fa-FRA
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=TCP&rtt=865&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2825&recv_bytes=2272&delivery_rate=3087420&cwnd=251&unsent_bytes=0&cid=d3ac90c419b8eeef&ts=263&x=0", cfL4;desc="?proto=QUIC&rtt=11890&sent=34&recv=23&lost=0&retrans=1&sent_bytes=24516&recv_bytes=5994&delivery_rate=996668&cwnd=12000&unsent_bytes=0&cid=45ac3cab7f9bc14d&ts=6285&x=1", cfHdrFlush;dur=0
date
Fri, 08 Nov 2024 00:21:22 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
server
cloudflare

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Google (Online)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| RboKYlekQY function| $ function| jQuery function| isNumber number| anwser function| loadCaptcha function| verifyCaptcha function| onCheckboxClick function| getRandomInt function| drawRandomLines function| drawRandomDots function| drawRandomEllipses function| drawCaptchaText function| drawCaptcha function| pTBcKsnkZG

2 Cookies

Domain/Path Name / Value
msj.urj7z9q.com/ Name: XSRF-TOKEN
Value: eyJpdiI6IlgvSFkvOUl5Zys0SkZZTHBYRTZ1cmc9PSIsInZhbHVlIjoidHZudU16aDRLUnFBZlRBS1dWTFhVa3N3dDFqb29tTjdHNHQzZEtGOERIazExRDM3TEhnaU84VWFUa0ViN1owQnYrZnM2NXFveWl6bVhoR0RuWUVnVkZPZXNvZTAveU0zMkhZZG1EaTRRd08xOWRZbUpobWFEYm1URkdIRmFJU3YiLCJtYWMiOiIxMDBlYWY4NDRmZTYxY2Q3NjBlMTAwNjZiYTY3ZDg3NzJlMWM3YmJmNDYyOThjNjBmNDFkOGYwNTIxNzkzMDU2IiwidGFnIjoiIn0%3D
msj.urj7z9q.com/ Name: laravel_session
Value: eyJpdiI6IlRNOTlaL0V6OFdJZGx2eFFpaDltZnc9PSIsInZhbHVlIjoieXk2RVgwbFN4cTNvTDhQRTBIRzYrRDBkcnIyN3hlRmVUUlJZTjljZG5tVjVjWWEySUJWT1BRSDdRU2hLTmZmeCtSVVhhTXdPMk82aGMzYmxraVZuNXhOVnh2K2pkWDY1bTV4cGlsNWVINEFnVUdVQjVEUGMweTQ3SDB5bkVpdWYiLCJtYWMiOiJkMmExNWJiMmJjYTc1ZjNlZDNhNWZiNTAxMDc4MGU3ZWE3YmMzYjBiOGRmM2Y0Y2ZkNzkyYzZkOTk3MTEyMTcxIiwidGFnIjoiIn0%3D

3 Console Messages

Source Level URL
Text
javascript warning URL: https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://msj.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
network error URL: https://msj.urj7z9q.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()