jdanielcook.net Open in urlscan Pro
208.97.150.110  Malicious Activity! Public Scan

Submitted URL: https://webhost000.verylegit.link/pcspeedup$459torrent.swf.docm
Effective URL: https://jdanielcook.net/items_001/excel/
Submission: On July 17 via manual from US

Summary

This website contacted 3 IPs in 1 countries across 4 domains to perform 4 HTTP transactions. The main IP is 208.97.150.110, located in Brea, United States and belongs to DREAMHOST-AS - New Dream Network, LLC, US. The main domain is jdanielcook.net.
TLS certificate: Issued by Let's Encrypt Authority X3 on July 9th 2018. Valid for: 3 months.
This is the only time jdanielcook.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Excel / PDF download (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 1 184.168.131.241 26496 (AS-26496-...)
1 208.97.150.110 26347 (DREAMHOST-AS)
2 151.101.112.193 54113 (FASTLY)
1 2 151.101.12.193 54113 (FASTLY)
4 3
Apex Domain
Subdomains
Transfer
4 imgur.com
i.imgur.com
6 KB
1 jdanielcook.net
jdanielcook.net
8 KB
1 x.co
x.co
100 B
1 verylegit.link
webhost000.verylegit.link
344 B
4 4
Domain Requested by
4 i.imgur.com 1 redirects jdanielcook.net
1 jdanielcook.net
1 x.co 1 redirects
1 webhost000.verylegit.link 1 redirects
4 4

This site contains no links.

Subject Issuer Validity Valid
jdanielcook.net
Let's Encrypt Authority X3
2018-07-09 -
2018-10-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://jdanielcook.net/items_001/excel/
Frame ID: 4B6DCD819663F6B75B390F11A6B64A9F
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://webhost000.verylegit.link/pcspeedup$459torrent.swf.docm HTTP 302
    https://x.co/6nTgE/// HTTP 302
    https://jdanielcook.net/items_001/excel/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

4
Requests

25 %
HTTPS

20 %
IPv6

4
Domains

4
Subdomains

3
IPs

1
Countries

14 kB
Transfer

12 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://webhost000.verylegit.link/pcspeedup$459torrent.swf.docm HTTP 302
    https://x.co/6nTgE/// HTTP 302
    https://jdanielcook.net/items_001/excel/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • http://i.imgur.com/9K48krG.jpg HTTP 302
  • http://i.imgur.com/removed.png

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
jdanielcook.net/items_001/excel/
Redirect Chain
  • https://webhost000.verylegit.link/pcspeedup$459torrent.swf.docm
  • https://x.co/6nTgE///
  • https://jdanielcook.net/items_001/excel/
7 KB
8 KB
Document
General
Full URL
https://jdanielcook.net/items_001/excel/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
208.97.150.110 Brea, United States, ASN26347 (DREAMHOST-AS - New Dream Network, LLC, US),
Reverse DNS
apache2-jolly.pike.dreamhost.com
Software
Apache /
Resource Hash
b77cea41e8253b5024beedbd43764cdaceca5cf1ca99624218b91def6e4afd09

Request headers

Host
jdanielcook.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
4B6DCD819663F6B75B390F11A6B64A9F

Response headers

Date
Tue, 17 Jul 2018 15:55:47 GMT
Server
Apache
Content-Length
7655
Keep-Alive
timeout=2, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

status
302
server
nginx/1.12.2
date
Tue, 17 Jul 2018 15:55:46 GMT
content-type
text/html; charset=utf-8
location
https://jdanielcook.net/items_001/excel/
v2dKDaf.png
i.imgur.com/
3 KB
4 KB
Image
General
Full URL
http://i.imgur.com/v2dKDaf.png
Requested by
Host: jdanielcook.net
URL: https://jdanielcook.net/items_001/excel/
Protocol
HTTP/1.1
Server
151.101.112.193 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
7900a6daf04859fef2501b2cf08851772deae586328d56d79a36e86c689851c5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 17 Jul 2018 15:55:47 GMT
Age
18251782
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
3432
X-Served-By
cache-iad2151-IAD, cache-hhn1522-HHN
Last-Modified
Thu, 08 Dec 2016 14:15:11 GMT
Server
cat factory 1.0
X-Timer
S1531842947.111024,VS0,VE1
ETag
"75099623c84266df9d4613b6caa88969"
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
image/png
Access-Control-Allow-Origin
*
cache-control
public, max-age=31536000
Accept-Ranges
bytes
X-Cache-Hits
2, 1
I7G94LL.gif
i.imgur.com/
543 B
1 KB
Image
General
Full URL
http://i.imgur.com/I7G94LL.gif
Requested by
Host: jdanielcook.net
URL: https://jdanielcook.net/items_001/excel/
Protocol
HTTP/1.1
Server
151.101.112.193 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
1a99a5a5bc47565a8b69c76e5f6469fc2361ad01c2c1db013dcab55300020e95

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 17 Jul 2018 15:55:47 GMT
Age
8043455
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
543
X-Served-By
cache-iad2122-IAD, cache-hhn1524-HHN
Last-Modified
Thu, 08 Dec 2016 14:18:49 GMT
Server
cat factory 1.0
X-Timer
S1531842947.106662,VS0,VE1
ETag
"b6a0113af4e29fe6693004e7ce659bd4"
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
*
cache-control
public, max-age=31536000
Accept-Ranges
bytes
X-Cache-Hits
1, 1
removed.png
i.imgur.com/
Redirect Chain
  • http://i.imgur.com/9K48krG.jpg
  • http://i.imgur.com/removed.png
503 B
1 KB
Image
General
Full URL
http://i.imgur.com/removed.png
Requested by
Host: jdanielcook.net
URL: https://jdanielcook.net/items_001/excel/
Protocol
HTTP/1.1
Server
151.101.12.193 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
9b5936f4006146e4e1e9025b474c02863c0b5614132ad40db4b925a10e8bfbb9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 17 Jul 2018 15:55:47 GMT
Age
18677792
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
503
X-Served-By
cache-iad2130-IAD, cache-fra19130-FRA
Last-Modified
Wed, 14 May 2014 05:44:36 GMT
Server
cat factory 1.0
X-Timer
S1531842947.207609,VS0,VE0
ETag
"d835884373f4d6c8f24742ceabe74946"
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
image/png
Access-Control-Allow-Origin
*
cache-control
public, max-age=31536000
Accept-Ranges
bytes
X-Cache-Hits
163585, 138555

Redirect headers

Date
Tue, 17 Jul 2018 15:55:47 GMT
Server
cat factory 1.0
Age
0
X-Served-By
cache-iad2139-IAD, cache-fra19130-FRA
Access-Control-Allow-Methods
GET, OPTIONS
Location
http://i.imgur.com/removed.png
X-Cache
MISS, MISS
Connection
keep-alive
Accept-Ranges
bytes
X-Timer
S1531842947.107221,VS0,VE94
Access-Control-Allow-Origin
*
Content-Length
0
Retry-After
0
X-Cache-Hits
0, 0

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Excel / PDF download (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| validateForm

0 Cookies