xsee6.z9.web.core.windows.net
Open in
urlscan Pro
20.60.242.238
Malicious Activity!
Public Scan
Effective URL: https://xsee6.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-84421-04568
Submission: On November 22 via api from JP — Scanned from CA
Summary
TLS certificate: Issued by Microsoft Azure RSA TLS Issuing CA 08 on October 29th 2024. Valid for: 6 months.
This is the only time xsee6.z9.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
26 | 20.60.242.238 20.60.242.238 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 15.204.213.5 15.204.213.5 | 16276 (OVH OVH SAS) (OVH OVH SAS) | |
28 | 4 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
xsee6.z9.web.core.windows.net |
ASN16276 (OVH OVH SAS, FR)
PTR: ns1019603.ip-15-204-213.us
ipwho.is |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
windows.net
xsee6.z9.web.core.windows.net |
962 KB |
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 58100 |
1015 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 847 |
27 KB |
28 | 3 |
Domain | Requested by | |
---|---|---|
26 | xsee6.z9.web.core.windows.net |
xsee6.z9.web.core.windows.net
|
1 | ipwho.is |
xsee6.z9.web.core.windows.net
|
1 | code.jquery.com |
xsee6.z9.web.core.windows.net
|
28 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure RSA TLS Issuing CA 08 |
2024-10-29 - 2025-04-27 |
6 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2024-03-13 - 2025-03-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://xsee6.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-84421-04568
Frame ID: CE5859ADF67E1AE893FF7FACC95E8A73
Requests: 29 HTTP requests in this frame
Screenshot
Page Title
コンピューターエラPage URL History Show full URLs
- https://xsee6.z9.web.core.windows.net/?bcda=%280101%29-84421-04568 Page URL
- https://xsee6.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-84421-04568 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://xsee6.z9.web.core.windows.net/?bcda=%280101%29-84421-04568 Page URL
- https://xsee6.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-84421-04568 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
xsee6.z9.web.core.windows.net/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
17 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tapa.css
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.4.4.min.js
code.jquery.com/ |
77 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
noir.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
82 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
537 KB 537 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boxc.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
47 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bx1.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
321 B 321 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mnc.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
187 B 557 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
168 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bel.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
276 B 646 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
set.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
364 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vsc.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pcm.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dm.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
332 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nvidia.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jupiter.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
503 B 879 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
340 B 716 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
esc.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
99 B 474 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
caps.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
509 B 885 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
escs.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
63 B 438 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safes.js
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
662 B 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
743 B 1015 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
349 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aud0jp87.mp3
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
226 KB 226 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ai2.mp3
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
xsee6.z9.web.core.windows.net/werrx01USAHTML/ |
168 B 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| t function| hdjwhuhyywtwygjnjkdqbcnkdkjiui string| bcda function| toggleFullScreen function| addEvent function| win_onkeydown_handler string| ipadd string| city string| country string| isp string| currtime number| isNS function| mischandler function| mousehandler0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ipwho.is
xsee6.z9.web.core.windows.net
15.204.213.5
20.60.242.238
2a04:4e42:600::649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