xyzxyz.org
Open in
urlscan Pro
192.185.52.105
Malicious Activity!
Public Scan
Effective URL: https://xyzxyz.org/sup-tmm/sup-mai/Dir/Connexion.html
Submission: On December 26 via api from NL — Scanned from FR
Summary
TLS certificate: Issued by R3 on December 14th 2023. Valid for: 3 months.
This is the only time xyzxyz.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Orange (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 192.185.52.105 192.185.52.105 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 1 | 2606:4700:20:... 2606:4700:20::ac43:4bab | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: gator4139.hostgator.com
xyzxyz.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
xyzxyz.org
xyzxyz.org |
58 KB |
1 |
jquery.app
jquery.app — Cisco Umbrella Rank: 119043 |
1 KB |
1 |
jqueryscript.net
1 redirects
www.jqueryscript.net — Cisco Umbrella Rank: 87655 |
489 B |
1 |
pblc.app
1 redirects
email.pblc.app |
922 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
5 | xyzxyz.org |
xyzxyz.org
|
1 | jquery.app |
xyzxyz.org
|
1 | www.jqueryscript.net | 1 redirects |
1 | email.pblc.app | 1 redirects |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.xyzxyz.org R3 |
2023-12-14 - 2024-03-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://xyzxyz.org/sup-tmm/sup-mai/Dir/Connexion.html
Frame ID: FC34AC415D78E6CD9056A1115AD62419
Requests: 6 HTTP requests in this frame
Screenshot
Page Title
Accéder à mes comptes en lignePage URL History Show full URLs
-
https://email.pblc.app/links/658a30230923bfa0f444f82c
HTTP 302
https://xyzxyz.org/sup-tmm/sup-mai/Dir/Connexion.html Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://email.pblc.app/links/658a30230923bfa0f444f82c
HTTP 302
https://xyzxyz.org/sup-tmm/sup-mai/Dir/Connexion.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://www.jqueryscript.net/css/jquerysctipttop.css HTTP 302
- https://jquery.app/jqueryscripttop.css
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Connexion.html
xyzxyz.org/sup-tmm/sup-mai/Dir/ Redirect Chain
|
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jqueryscripttop.css
jquery.app/ Redirect Chain
|
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image.css
xyzxyz.org/sup-tmm/sup-mai/Dir/files/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
back.PNG
xyzxyz.org/sup-tmm/sup-mai/Dir/files/ |
37 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
indiquer.PNG
xyzxyz.org/sup-tmm/sup-mai/Dir/files/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
comment.PNG
xyzxyz.org/sup-tmm/sup-mai/Dir/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Orange (Telecommunication)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| showHide0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
email.pblc.app
jquery.app
www.jqueryscript.net
xyzxyz.org
192.185.52.105
2606:4700:20::ac43:4bab
2a06:98c1:3120::3
2a06:98c1:3121::3
324f173a65affdc2506935ac2f7b61ca136877a8f3116e92a294fd2259c26b41
69e964fbc7987cbef8e5c3d461820a31e178de2dfe4fbc66879cd294aecca072
7f752438291e281d4351434ef92bd2c7699d73530b5aa272e5ca37e4e6ba4a66
967d1e40eba2b611ba5785dd86c6949766cbaa0051d12f417909a20abf301228
a4573ab1815cf119fdefabbc380b7785501f1c7499159a2756854dc6082ad3c9
c5ae5e3c57049849d2ad9a2a93c6a627849680e4a8c6662367ca732632fca90f