bryggeflsk.com
Open in
urlscan Pro
2606:4700:30::681b:9fbd
Malicious Activity!
Public Scan
Submission: On April 20 via automatic, source openphish
Summary
This is the only time bryggeflsk.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:30:... 2606:4700:30::681b:9fbd | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
6 | 2606:4700:30:... 2606:4700:30::681b:9ebd | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
8 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
bryggeflsk.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
bryggeflsk.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
bryggeflsk.com
bryggeflsk.com |
630 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | bryggeflsk.com |
bryggeflsk.com
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bryggeflsk.com/authentication/verify/omnicraft/step2.php?l=_JeHFUq_VJOXK0QWHtoGYDw1774256418&fid.13InboxLight.aspxn.1774256418&fid.125289964252813InboxLight99642_Product-userid&email=metals-sg-ops@thisisnoble.com
Frame ID: D3C664278BC166655342F4BDC13B3BF4
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
step2.php
bryggeflsk.com/authentication/verify/omnicraft/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conv.min.css
bryggeflsk.com/authentication/verify/omnicraft/css/ |
18 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t3.png
bryggeflsk.com/authentication/verify/omnicraft/images/ |
52 KB 53 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logn.png
bryggeflsk.com/authentication/verify/omnicraft/images/ |
523 B 890 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
m9.png
bryggeflsk.com/authentication/verify/omnicraft/images/ |
753 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
small.jpg
bryggeflsk.com/authentication/verify/omnicraft/images/ |
365 B 365 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t1.jpg
bryggeflsk.com/authentication/verify/omnicraft/images/ |
566 KB 566 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csscheckbox_a4824bcf5d413f078bdd6abd3e6e5bf4.png
bryggeflsk.com/authentication/verify/omnicraft/images/ |
895 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| unhideBody1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bryggeflsk.com/ | Name: __cfduid Value: d4783be317b76b4cb96aaaa94dae5ce251555747022 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bryggeflsk.com
2606:4700:30::681b:9ebd
2606:4700:30::681b:9fbd
34c1ac1ea387eff19c493c9538b31a09886a25d97b0112ab78cc9d2d993893c6
678351abbdb72563c2a552253ca0d8962c7c678910563cc5ad32e8000114f768
7764c38d71f5ee52d39f237f08b4e82b4715c73bfa0afbaee30a60b0dfd058ca
7b73f03db4759a9a8cfe2860f5af3f4e9be1101dc03ffba61357960947092bb6
9dd5e031a96cb31830ef2fb13009f70f2001f7204e8e96faf0999821e7dd67eb
a082b1de897c01c874a9adebe1176db62100aeca440a0692a000a1da7b361f2b
c2d5ac2e5a041d4925fd77de1880a678ad3638186f57e0970e0e081c6c8812d4
e8fc8a8a07adf6262c1a9b88f2d659a35278ac2e23c49c4870fc454a5b44bcc9