aviacon.me
Open in
urlscan Pro
81.171.3.195
Malicious Activity!
Public Scan
Submission: On August 07 via automatic, source openphish
Summary
This is the only time aviacon.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 81.171.3.195 81.171.3.195 | 60781 (LEASEWEB-...) (LEASEWEB-NL-AMS-01 Netherlands) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 2 |
ASN60781 (LEASEWEB-NL-AMS-01 Netherlands, NL)
PTR: srv555.darkwing.live
aviacon.me |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
aviacon.me
aviacon.me |
98 KB |
2 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
293 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
5 | aviacon.me |
aviacon.me
|
2 | secure.aadcdn.microsoftonline-p.com | |
7 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 1 |
2017-08-15 - 2019-08-15 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/?Key=21113734321&rand=13InboxLightaspxn.211137343211774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn..1774256418&fid.1252899642&fid.1&fav.1&login=&.rand=13InboxLight.aspx?n=211137343211774256418&fid=4
Frame ID: B2E0947706319042E68D675812FC7DF5
Requests: 6 HTTP requests in this frame
Frame:
http://aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/data_files/Prefetch.html
Frame ID: B2F783EC3C5A7C7C2A477030B6D367B9
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- url /\.aspx(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx(?:$|\?)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & Cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/ |
9 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.login.min.css
aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/data_files/ |
84 KB 85 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/data_files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account_msa.svg
aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/Sign%20in%20to%20your%20Microsoft%20account_files/ |
379 B 624 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Prefetch.html
aviacon.me/xle/Netfra/Netframe/5435398ced83ad3b6437ea3393ae86d7/data_files/ Frame B2F7 |
394 B 595 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.6387.8/content/images/backgrounds/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.6387.8/content/images/backgrounds/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aviacon.me
secure.aadcdn.microsoftonline-p.com
2a02:26f0:6c00:283::35c1
81.171.3.195
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
34d8da073f47030ee94b99d84fbe68e3345bd8aaa37ea909ff2da00238447486
4f962ec8ae085492d496fcbbd74185ab1c8e377438dbcb5ec4f8517b7bd9293f
62faab60433070e2ea52c235f0f18db228759f2a08bb6f9e5711630df8321214
8d86325fe29f5a7431dc3b42f3a19919b4457fc6f997796ccee19aa0c61b2e17
b8ecd267f56816b4be40c7c8e042cfce37421d441b7e972a6e26995689f8ce58
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b