bsroak.dnsabr.com
Open in
urlscan Pro
103.252.41.66
Malicious Activity!
Public Scan
Submission: On May 30 via automatic, source openphish
Summary
This is the only time bsroak.dnsabr.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 103.252.41.66 103.252.41.66 | 133296 (WEBWERKS-...) (WEBWERKS-AS-IN Web Werks India Pvt. Ltd.) | |
2 | 2a00:1450:400... 2a00:1450:4001:825::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
9 | 5 |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US)
use.fontawesome.com |
ASN15169 (GOOGLE - Google LLC, US)
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
dnsabr.com
bsroak.dnsabr.com |
46 KB |
3 |
googleapis.com
fonts.googleapis.com ajax.googleapis.com |
31 KB |
1 |
fontawesome.com
use.fontawesome.com |
14 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
5 | bsroak.dnsabr.com |
bsroak.dnsabr.com
|
2 | fonts.googleapis.com |
bsroak.dnsabr.com
|
1 | ajax.googleapis.com |
bsroak.dnsabr.com
|
1 | use.fontawesome.com |
bsroak.dnsabr.com
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2019-05-07 - 2019-07-30 |
3 months | crt.sh |
*.fontawesome.com DigiCert SHA2 Secure Server CA |
2018-09-17 - 2019-11-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://bsroak.dnsabr.com/new/WFsKRntpx2hB6u5tat8kLUaLfWcjR5UtVgPJ8SPppMhzWCscN7U69kedRSmMjoXv4C/
Frame ID: DE5201A563C1C2AC534115D1164FCE7D
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
bsroak.dnsabr.com/new/WFsKRntpx2hB6u5tat8kLUaLfWcjR5UtVgPJ8SPppMhzWCscN7U69kedRSmMjoXv4C/ |
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 616 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
share-point.css
bsroak.dnsabr.com/new/WFsKRntpx2hB6u5tat8kLUaLfWcjR5UtVgPJ8SPppMhzWCscN7U69kedRSmMjoXv4C/css/ |
15 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.8.2/css/ |
54 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
bsroak.dnsabr.com/new/WFsKRntpx2hB6u5tat8kLUaLfWcjR5UtVgPJ8SPppMhzWCscN7U69kedRSmMjoXv4C/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pdf.png
bsroak.dnsabr.com/new/WFsKRntpx2hB6u5tat8kLUaLfWcjR5UtVgPJ8SPppMhzWCscN7U69kedRSmMjoXv4C/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_strip.png
bsroak.dnsabr.com/new/WFsKRntpx2hB6u5tat8kLUaLfWcjR5UtVgPJ8SPppMhzWCscN7U69kedRSmMjoXv4C/img/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.4.0/ |
86 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
0 570 B |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 2 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online) Microsoft (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bsroak.dnsabr.com/ | Name: PHPSESSID Value: pdch9i3sd5iepd604ca9tfl8k0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bsroak.dnsabr.com
fonts.googleapis.com
use.fontawesome.com
103.252.41.66
23.111.9.35
2a00:1450:4001:820::200a
2a00:1450:4001:825::200a
0497a8d2a9bde7db8c0466fae73e347a3258192811ed1108e3e096d5f34ac0e8
06d6e10886ed7de5561acab1935bce1c46174baa9cbd0bcb319aa3b69594131f
0f053e63258c79fdeb028177f528b7789b9c03b1323def7bce2ce952ca1d51cb
29b7a9358abdc68c51db5a5af4a4f4e2e041a67527adee2366b1f84f116fe9a5
2ee69aef3afb10b368bde9fea7e97cc75c030c890e3d2b8dc4ad19d498234dbf
3d1662d7089b3803e1fc366c4f905b7fa74fb18c03bca96b53f6dea2a876c1b7
825de044d5ac6442a094ff95099f9f67e9249a8110a2fbd57128285776632adb
cf21599446efc885615104b9dc67f230157b540d3ca7bb6a6c53794b0a74c163
db307fcef7f95139689007d7a623b340ec21282bd421c4e4b2ba09078f230545
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855