throughway.top Open in urlscan Pro
2606:4700:30::6812:2a9a  Malicious Activity! Public Scan

Submitted URL: http://throughway.top/OHSP/index.php
Effective URL: https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2...
Submission: On November 15 via manual from US

Summary

This website contacted 4 IPs in 1 countries across 3 domains to perform 3 HTTP transactions. The main IP is 2606:4700:30::6812:2a9a, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is throughway.top.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on November 15th 2019. Valid for: a year.
This is the only time throughway.top was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 3 2606:4700:30:... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2600:3c01::f0... 63949 (LINODE-AP...)
3 4
Apex Domain
Subdomains
Transfer
3 throughway.top
throughway.top
197 KB
1 jsonip.com
jsonip.com
486 B
1 cloudflare.com
cdnjs.cloudflare.com
73 KB
3 3
Domain Requested by
3 throughway.top 2 redirects
1 jsonip.com cdnjs.cloudflare.com
1 cdnjs.cloudflare.com throughway.top
3 3

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2019-11-15 -
2020-10-09
a year crt.sh
ssl412106.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-10 -
2020-02-16
6 months crt.sh
jsonip.com
Let's Encrypt Authority X3
2019-10-22 -
2020-01-20
3 months crt.sh

This page contains 1 frames:

Primary Page: https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
Frame ID: 5F62BD10FADE972A44DF41A49DFAC57E
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://throughway.top/OHSP/index.php HTTP 301
    https://throughway.top/OHSP/index.php HTTP 303
    https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Page Statistics

3
Requests

100 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

4
IPs

1
Countries

269 kB
Transfer

732 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://throughway.top/OHSP/index.php HTTP 301
    https://throughway.top/OHSP/index.php HTTP 303
    https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
throughway.top/OHSP/s/
Redirect Chain
  • http://throughway.top/OHSP/index.php
  • https://throughway.top/OHSP/index.php
  • https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
273 KB
196 KB
Document
General
Full URL
https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6812:2a9a , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
28e92ace60a3761df678761149aedfce6aec102c70645f9ef0102426e695ed70

Request headers

:method
GET
:authority
throughway.top
:scheme
https
:path
/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
cookie
__cfduid=d445db2253b3d9d1ac497c7c8010a4d891573854971; PHPSESSID=95855ae594bd020f917af1f1f32f3954
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Fri, 15 Nov 2019 21:56:11 GMT
content-type
text/html; charset=UTF-8
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
53647944fe2ecbb8-VIE
content-encoding
br

Redirect headers

status
303
date
Fri, 15 Nov 2019 21:56:11 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=d445db2253b3d9d1ac497c7c8010a4d891573854971; expires=Sat, 14-Nov-20 21:56:11 GMT; path=/; domain=.throughway.top; HttpOnly; Secure PHPSESSID=95855ae594bd020f917af1f1f32f3954; path=/
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
location
./s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
53647942f8c2cbb8-VIE
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/
257 KB
73 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.js
Requested by
Host: throughway.top
URL: https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4004 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8eb3cb67ef2f0f1b76167135cef6570a409c79b23f0bc0ede71c9a4018f1408a
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 15 Nov 2019 21:56:12 GMT
content-encoding
br
vary
Accept-Encoding
cf-cache-status
HIT
age
18483543
status
200
alt-svc
h3-23=":443"; ma=86400
served-in-seconds
0.004
timing-allow-origin
*
last-modified
Thu, 17 May 2018 09:20:15 GMT
server
cloudflare
etag
W/"5afd494f-40464"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
53647949dc5f8c86-VIE
expires
Wed, 04 Nov 2020 21:56:12 GMT
truncated
/
182 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a895764d445a44bc81ad3ca38b79d0b260f70e0d3f5b3e27b54c134e20d2c51f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
/
jsonip.com/
185 B
486 B
Script
General
Full URL
https://jsonip.com/?callback=jQuery3000748338809676842_1573854972508&_=1573854972509
Requested by
Host: cdnjs.cloudflare.com
URL: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:3c01::f03c:91ff:fe79:43b , United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
Software
nginx/1.16.1 /
Resource Hash
f3c487f98a08165479bd028cf6484be01ea3d8d63d7a8122eeafa6943fa2d052
Security Headers
Name Value
Strict-Transport-Security max-age=31536000;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://throughway.top/OHSP/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=76a6e3f1ad97269b098d9c6fb4db98378bdd1d7adf2be018fe11f17a9af280756e77883b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 15 Nov 2019 21:56:12 GMT
Server
nginx/1.16.1
Strict-Transport-Security
max-age=31536000;
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Transfer-Encoding
chunked
Connection
keep-alive
truncated
/
7 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
814314cb8f48f372aefd15115576a89265566420eff73ef521a3550a15d7247e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
10 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
342def8edb2c67f86774e3b22cc3d2dd5b42436c1e79f412b33546f62c4c7223

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8db355c2fbcc53ba36e55683914043ffe9c071c7dd9627e95920b879370f59f7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| getIPAddress string| x

3 Cookies

Domain/Path Name / Value
.throughway.top/ Name: __cfduid
Value: d445db2253b3d9d1ac497c7c8010a4d891573854971
throughway.top/ Name: PHPSESSID
Value: 95855ae594bd020f917af1f1f32f3954
throughway.top/OHSP/s Name: ip11
Value: 2a01:4f8:192:5414::2