windowsaccessblockedtcpfailureport443.xyz
Open in
urlscan Pro
51.89.20.192
Malicious Activity!
Public Scan
Submission: On March 09 via manual from ZA
Summary
This is the only time windowsaccessblockedtcpfailureport443.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 51.89.20.192 51.89.20.192 | 16276 (OVH) (OVH) | |
2 | 2a00:1450:400... 2a00:1450:4001:819::200a | 15169 (GOOGLE) (GOOGLE) | |
1 2 | 198.211.112.20 198.211.112.20 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
3 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 4 |
ASN16276 (OVH, FR)
PTR: s82.fastserver.club
windowsaccessblockedtcpfailureport443.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
windowsaccessblockedtcpfailureport443.xyz
windowsaccessblockedtcpfailureport443.xyz |
308 KB |
3 |
gstatic.com
fonts.gstatic.com |
30 KB |
2 |
cuvesk.com
1 redirects
analytics.cuvesk.com |
231 B |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
7 | windowsaccessblockedtcpfailureport443.xyz |
windowsaccessblockedtcpfailureport443.xyz
|
3 | fonts.gstatic.com |
windowsaccessblockedtcpfailureport443.xyz
|
2 | analytics.cuvesk.com |
1 redirects
windowsaccessblockedtcpfailureport443.xyz
|
2 | fonts.googleapis.com |
windowsaccessblockedtcpfailureport443.xyz
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.storage.googleapis.com GTS CA 1O1 |
2020-02-12 - 2020-05-06 |
3 months | crt.sh |
*.google.com GTS CA 1O1 |
2020-02-12 - 2020-05-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/
Frame ID: 55996D34ECFA3C00495F024C6382B0B6
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 6- http://analytics.cuvesk.com/rout/rout.js HTTP 301
- http://analytics.cuvesk.com/
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/ |
69 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 558 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/files/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background-2.png
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/files/ |
210 KB 195 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alert.jpg
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/files/ |
35 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/files/ |
977 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 791 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
analytics.cuvesk.com/ Redirect Chain
|
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alertmicrosoft.mp3
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/files/ |
60 KB 60 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
warning.mp3
windowsaccessblockedtcpfailureport443.xyz/windows%20popup/win%20popup%202/www.windowsproductreport.review/supportcenter/files/ |
13 KB 14 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NaPDcZTIAOhVxoMyOr9n_E7ffHjDGItzY5abuWI.woff2
fonts.gstatic.com/s/titilliumweb/v8/ |
11 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| CustomAnlysis function| ca string| phone_number function| evali function| eval10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
analytics.cuvesk.com
fonts.googleapis.com
fonts.gstatic.com
windowsaccessblockedtcpfailureport443.xyz
198.211.112.20
2a00:1450:4001:819::200a
2a00:1450:4001:81d::2003
51.89.20.192
23bad0512886d1e5a5a944a3ebed4ba5544071d3984e99d61fbd032435f4a548
3e6626bd3c2530decfb74cdec3051faeaf44bd994c4ed6811b96af42b533ac2f
4ecf6d7a1f530531b62daab7ddbb40a7f34cd6a1f02013fc8875373e0cb1d6dc
642e5e0499717db14eb22a8df45d9e5687cb659d5ca53b7d55e7ec3bb6b37118
844a92ee435552f7f26b4ec467220c537841f8245a16bbb265975ce4b3081f36
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
af799a6513553c4aa0e6c1ba49c34043563b2fbe2ff87708584220908890b982
b0a1cefd0513370a6e4d345229bc3f46e1bb554aca35079d0e23f844c4268fc2
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
cd6f4900abc2da200ad96c75852facfd8872610ce9dd259acf3cc82507490dd3
d00255a582d67e7d1061097b97f939b3d4e4bd48c31e6e0fd1cdf3d2f271ab63
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f4d5cae00178437f63e868ded066dde7503207230142ab3c37ef8ca70a03574d