inner.website
Open in
urlscan Pro
104.26.3.170
Malicious Activity!
Public Scan
Submission: On March 12 via manual from IL — Scanned from IL
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on April 17th 2023. Valid for: a year.
This is the only time inner.website was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 104.26.3.170 104.26.3.170 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 104.26.9.233 104.26.9.233 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
cybeready.net
lp.cybeready.net |
200 KB |
5 |
inner.website
1 redirects
inner.website |
7 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 228 |
31 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
7 | lp.cybeready.net |
inner.website
lp.cybeready.net |
5 | inner.website |
1 redirects
inner.website
cdnjs.cloudflare.com |
2 | cdnjs.cloudflare.com |
inner.website
|
13 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
login.microsoftonline.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-04-17 - 2024-04-16 |
a year | crt.sh |
cybeready.net Cloudflare Inc ECC CA-3 |
2023-05-19 - 2024-05-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://inner.website/8e7a6f869sf9d84168iaad70860jc17c8e68.html
Frame ID: 13C6D6FF7410EE2F3B62354AC3C011B3
Requests: 11 HTTP requests in this frame
Frame:
https://inner.website/cdn-cgi/challenge-platform/h/g/scripts/jsd/5b600c458061/main.js
Frame ID: 76AE7DA9209F1862E5BB6954C23FB1BC
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Terms of use
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://inner.website/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://inner.website/cdn-cgi/challenge-platform/h/g/scripts/jsd/5b600c458061/main.js
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
8e7a6f869sf9d84168iaad70860jc17c8e68.html
inner.website/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sanitize.css
lp.cybeready.net/Forms/MS-online/ |
526 B 665 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
lp.cybeready.net/Forms/MS-online/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
82 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validator.js
lp.cybeready.net/Forms/MS-online/ |
1 KB 797 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page.js
lp.cybeready.net/common/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bannerlogo.png
lp.cybeready.net/Forms/MS-online/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.png
lp.cybeready.net/Forms/MS-online/ |
653 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
heroillustration.jpg
lp.cybeready.net/Forms/MS-online/ |
192 KB 193 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
inner.website/cdn-cgi/challenge-platform/h/g/scripts/jsd/5b600c458061/ Frame 76AE Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
8632e49fcdc84c4f
inner.website/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame 76AE |
0 486 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
8e7a6f869sf9d84168iaad70860jc17c8e68.html
inner.website/ |
0 320 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| getcrrid function| $ function| jQuery object| validator2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.inner.website/ | Name: cf_clearance Value: IPVRW_Wf1xxikC4_nTl2re7fmDaYLcKQWJy_Sa8lCZE-1710237164-1.0.1.1-8fj6gC114DglmEDxNiAHAszEppIyhmWhbPr6XJvaOJX9lGWjbmZPz.tVzsI_5YbLlYTbT1SwvI7J7ARRjNsrLA |
|
inner.website/ | Name: requestid Value: 1b208d6b9e3e9a329e15954f01c8e8b0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
inner.website
lp.cybeready.net
104.17.24.14
104.26.3.170
104.26.9.233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