adfifdroco.duckdns.org
Open in
urlscan Pro
45.83.84.92
Malicious Activity!
Public Scan
Submission: On April 18 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on April 17th 2023. Valid for: 3 months.
This is the only time adfifdroco.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Softbank (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
18 | 45.83.84.92 45.83.84.92 | 35913 (DEDIPATH-LLC) (DEDIPATH-LLC) | |
18 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
duckdns.org
adfifdroco.duckdns.org |
238 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
18 | adfifdroco.duckdns.org |
adfifdroco.duckdns.org
|
18 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bsgndbwmcu.duckdns.org R3 |
2023-04-17 - 2023-07-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://adfifdroco.duckdns.org/
Frame ID: 94A5CA182BEA996AAAA858EA1EF57269
Requests: 18 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
adfifdroco.duckdns.org/ |
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
adfifdroco.duckdns.org/static/softbank/ |
570 KB 65 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-common.css
adfifdroco.duckdns.org/static/softbank/ |
26 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-temporary.css
adfifdroco.duckdns.org/static/softbank/ |
16 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notice_pcidss_y_tls.css
adfifdroco.duckdns.org/static/softbank/ |
940 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
adfifdroco.duckdns.org/static/softbank/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
adfifdroco.duckdns.org/static/softbank/ |
284 KB 105 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
adfifdroco.duckdns.org/static/js/ |
85 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.cookie.js
adfifdroco.duckdns.org/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.loadmask.css
adfifdroco.duckdns.org/static/css/ |
3 KB 951 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.loadmask.min.js
adfifdroco.duckdns.org/static/js/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-header-mysb.png
adfifdroco.duckdns.org/static/softbank/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-logo.png
adfifdroco.duckdns.org/static/softbank/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switch_blind.png
adfifdroco.duckdns.org/static/softbank/ |
261 B 459 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
adfifdroco.duckdns.org/static/softbank/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
adfifdroco.duckdns.org/static/softbank/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
adfifdroco.duckdns.org/static/softbank/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_switch_blind.png
adfifdroco.duckdns.org/img/shared/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Softbank (Telecommunication)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| layui function| lay number| errors object| layer object| jQuery112405337429100657625 function| $ function| jQuery undefined| order object| mask object| timer1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
adfifdroco.duckdns.org/ | Name: sessionid Value: 2f6bebf35089a18df21d63c309021c99 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
adfifdroco.duckdns.org
45.83.84.92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