common.oauth2.d1l.us
Open in
urlscan Pro
162.0.214.31
Malicious Activity!
Public Scan
Effective URL: https://common.oauth2.d1l.us/next.php?ss=2
Submission: On March 23 via api from US
Summary
TLS certificate: Issued by R3 on March 19th 2021. Valid for: 3 months.
This is the only time common.oauth2.d1l.us was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2600:9000:206... 2600:9000:206f:5800:19:9934:6a80:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
3 4 | 107.152.33.84 107.152.33.84 | 11878 (TZULO) (TZULO) | |
2 | 20.190.160.71 20.190.160.71 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 1 | 162.215.248.191 162.215.248.191 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
2 10 | 162.0.214.31 162.0.214.31 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
11 | 3 |
ASN16509 (AMAZON-02, US)
common-oauth2.app.link |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
login.microsoftonline.com |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-215-248-191.unifiedlayer.com
common.oauth2.ael.com.bd |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
d1l.us
2 redirects
common.oauth2.d1l.us |
323 KB |
4 |
stop-robot.live
3 redirects
stop-robot.live |
5 KB |
2 |
microsoftonline.com
login.microsoftonline.com |
|
2 |
app.link
2 redirects
common-oauth2.app.link |
1 KB |
1 |
ael.com.bd
1 redirects
common.oauth2.ael.com.bd |
370 B |
11 | 5 |
Domain | Requested by | |
---|---|---|
10 | common.oauth2.d1l.us |
2 redirects
common.oauth2.d1l.us
|
4 | stop-robot.live | 3 redirects |
2 | login.microsoftonline.com |
stop-robot.live
|
2 | common-oauth2.app.link | 2 redirects |
1 | common.oauth2.ael.com.bd | 1 redirects |
11 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.stop-robot.live R3 |
2021-02-22 - 2021-05-23 |
3 months | crt.sh |
stamp2.login.microsoftonline.com DigiCert SHA2 Secure Server CA |
2021-02-24 - 2022-02-23 |
a year | crt.sh |
common.oauth2.d1l.us R3 |
2021-03-19 - 2021-06-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://common.oauth2.d1l.us/next.php?ss=2
Frame ID: EC93C672B3D0026B0F084B3C324E6495
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://common-oauth2.app.link/e/stop-robot
HTTP 307
https://stop-robot.live/aWNsb3VkQGljbG91ZC5jb20=?_branch_match_id=902961105274514805&utm_source=utm_... HTTP 302
https://stop-robot.live/info/ Page URL
-
https://common-oauth2.app.link/e/cvpxUEkHAQE75z9j
HTTP 307
http://common.oauth2.ael.com.bd/c2FsZXNAa2Fyb3V0YXMuc3V6dWtpLW5ldHdvcmsuZ3I=?_branch_match_id=90296110527451... HTTP 302
https://common.oauth2.d1l.us/?ss=2&ea=sales@karoutas.suzuki-network.gr&session=f43c7f32e2a2a9be134b3f6bc8... HTTP 302
https://common.oauth2.d1l.us/login.php?ss=2&ea=sales@karoutas.suzuki-network.gr HTTP 302
https://common.oauth2.d1l.us/next.php?ss=2 Page URL
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://common-oauth2.app.link/e/stop-robot
HTTP 307
https://stop-robot.live/aWNsb3VkQGljbG91ZC5jb20=?_branch_match_id=902961105274514805&utm_source=utm_y&utm_campaign=utm_z&utm_medium=utm_x HTTP 302
https://stop-robot.live/info/ Page URL
-
https://common-oauth2.app.link/e/cvpxUEkHAQE75z9j
HTTP 307
http://common.oauth2.ael.com.bd/c2FsZXNAa2Fyb3V0YXMuc3V6dWtpLW5ldHdvcmsuZ3I=?_branch_match_id=902961105274514805&utm_source=utm_y&utm_campaign=utm_z&utm_medium=utm_x HTTP 302
https://common.oauth2.d1l.us/?ss=2&ea=sales@karoutas.suzuki-network.gr&session=f43c7f32e2a2a9be134b3f6bc8a01373f43c7f32e2a2a9be134b3f6bc8a01373 HTTP 302
https://common.oauth2.d1l.us/login.php?ss=2&ea=sales@karoutas.suzuki-network.gr HTTP 302
https://common.oauth2.d1l.us/next.php?ss=2 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://common-oauth2.app.link/e/stop-robot HTTP 307
- https://stop-robot.live/aWNsb3VkQGljbG91ZC5jb20=?_branch_match_id=902961105274514805&utm_source=utm_y&utm_campaign=utm_z&utm_medium=utm_x HTTP 302
- https://stop-robot.live/info/
- https://stop-robot.live/js/ads.js HTTP 302
- https://login.microsoftonline.com/3b5c2832-4b4d-4b6a-aa14-ffb05086b26c/oauth2/logout
- https://stop-robot.live/info/js/jquery-2.5.1.min.js HTTP 302
- https://login.microsoftonline.com/3b5c2832-4b4d-4b6a-aa14-ffb05086b26c/oauth2/logout
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
stop-robot.live/info/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout
login.microsoftonline.com/3b5c2832-4b4d-4b6a-aa14-ffb05086b26c/oauth2/ Redirect Chain
|
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout
login.microsoftonline.com/3b5c2832-4b4d-4b6a-aa14-ffb05086b26c/oauth2/ Redirect Chain
|
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
next.php
common.oauth2.d1l.us/ Redirect Chain
|
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged1033.css
common.oauth2.d1l.us/files/ |
99 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo3.png
common.oauth2.d1l.us/files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
load2.gif
common.oauth2.d1l.us/files/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
common.oauth2.d1l.us/files/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
quest.png
common.oauth2.d1l.us/files/ |
355 B 684 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
common.oauth2.d1l.us/files/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
common.oauth2.d1l.us/files/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| empty function| change function| myFunction function| myFunction21 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
common.oauth2.d1l.us/ | Name: PHPSESSID Value: u7ptr4j9f9s4osrh7hqhoqbom0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
common-oauth2.app.link
common.oauth2.ael.com.bd
common.oauth2.d1l.us
login.microsoftonline.com
stop-robot.live
107.152.33.84
162.0.214.31
162.215.248.191
20.190.160.71
2600:9000:206f:5800:19:9934:6a80:93a1
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
2ec900b69976ea8831b52fe02092bccc9ed9b6a178f1154fb16d8a9b309c36bb
3de7665a5dd808ccaee92848898bc5baaab67a33f97e7863ea22cff354510159
62faab60433070e2ea52c235f0f18db228759f2a08bb6f9e5711630df8321214
82bb14eaeec4c971c85dafc91a78999a5b9f52eeaa3be657f55be9dbe3d4aff0
85eb7e94db9425fd39e3a6d89e5abaf398611529a3d25d078015cc11e055260b
b5d587f6c48a9b22bbe97150249e0c0655ac1780bd273431480a22f8a5bfef6c
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f7b7e28053006ab5acd2e382276ed17e6479bb860828107fae4a430ca3d64083