104.248.177.241
Open in
urlscan Pro
104.248.177.241
Malicious Activity!
Public Scan
Submission: On April 19 via manual from US
Summary
This is the only time 104.248.177.241 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Generic (Online) Tech Support Scam (Consumer)Downloads These files were downloaded by the website
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 104.248.177.241 104.248.177.241 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
13 | 5 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
104.248.177.241 |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
22 KB |
1 |
googleapis.com
fonts.googleapis.com |
2 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
2 | maxcdn.bootstrapcdn.com |
104.248.177.241
|
1 | fonts.googleapis.com |
104.248.177.241
|
1 | code.jquery.com |
104.248.177.241
|
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-03-26 - 2019-06-18 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
http://104.248.177.241/pc-error-0xxxchxx88/?phone=+1-(888)-960-9135&
Frame ID: E4BBB12CBB3066A38E167453646C352F
Requests: 12 HTTP requests in this frame
Frame:
http://104.248.177.241/pc-error-0xxxchxx88/sound.mp3
Frame ID: DC822E04BD865F2AED209978CF9578D5
Requests: 2 HTTP requests in this frame
Screenshot
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
104.248.177.241/pc-error-0xxxchxx88/ |
23 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-theme.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
23 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
104.248.177.241/pc-error-0xxxchxx88/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rsod.png
104.248.177.241/pc-error-0xxxchxx88/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
335158-windows-8-window.png
104.248.177.241/pc-error-0xxxchxx88/images/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
104.248.177.241/pc-error-0xxxchxx88/js/ |
8 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
33 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
104.248.177.241/pc-error-0xxxchxx88/images/ |
41 KB 41 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
239 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sound.mp3
104.248.177.241/pc-error-0xxxchxx88/assets/audio/ |
140 KB 141 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sound.mp3
104.248.177.241/pc-error-0xxxchxx88/ Frame DC82 |
991 B 0 |
Document
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sound.mp3
104.248.177.241/pc-error-0xxxchxx88/ Frame DC82 |
140 KB 141 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Generic (Online) Tech Support Scam (Consumer)30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery boolean| isOpera boolean| isFirefox boolean| isSafari boolean| isChrome boolean| isIE function| getVariableFromURl function| fillForm function| closeCode function| getCode function| modalClose function| getModal function| _toggleFullScreen function| open1 function| isPlaying function| forceDownload function| catchControlKeys function| prevent string| phone boolean| state function| confirmExit function| get_browser boolean| InternetEx boolean| isIEedge object| browser undefined| msg_ff0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
maxcdn.bootstrapcdn.com
104.248.177.241
205.185.208.52
209.197.3.15
2a00:1450:4001:81f::200a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