mscsconsult.com
Open in
urlscan Pro
136.243.43.135
Malicious Activity!
Public Scan
Submission: On October 10 via manual from ZA
Summary
This is the only time mscsconsult.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 136.243.43.135 136.243.43.135 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:811::200a | 15169 (GOOGLE) (GOOGLE - Google Inc.) | |
3 | 2a00:1450:400... 2a00:1450:4001:811::2003 | 15169 (GOOGLE) (GOOGLE - Google Inc.) | |
14 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
mscsconsult.com
1 redirects
mscsconsult.com |
623 KB |
3 |
gstatic.com
fonts.gstatic.com |
79 KB |
1 |
googleapis.com
fonts.googleapis.com |
444 B |
14 | 3 |
Domain | Requested by | |
---|---|---|
11 | mscsconsult.com |
1 redirects
mscsconsult.com
|
3 | fonts.gstatic.com |
mscsconsult.com
|
1 | fonts.googleapis.com |
mscsconsult.com
|
14 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://mscsconsult.com/dox/directxxz/
Frame ID: 25360.1
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://mscsconsult.com/dox/directxxz
HTTP 301
http://mscsconsult.com/dox/directxxz/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mscsconsult.com/dox/directxxz
HTTP 301
http://mscsconsult.com/dox/directxxz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
mscsconsult.com/dox/directxxz/ Redirect Chain
|
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theDocs.all.min.css
mscsconsult.com/dox/directxxz/assets/css/ |
203 KB 203 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
custom.css
mscsconsult.com/dox/directxxz/assets/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
fonts.googleapis.com/ |
1 KB 444 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
mscsconsult.com/dox/directxxz/assets/img/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
excel1.png
mscsconsult.com/dox/directxxz/assets/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
mscsconsult.com/dox/directxxz/assets/js/ |
81 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.min.js
mscsconsult.com/dox/directxxz/assets/js/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theDocs.all.min.js
mscsconsult.com/dox/directxxz/assets/js/ |
222 KB 222 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
custom.js
mscsconsult.com/dox/directxxz/assets/js/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
v0SdcGFAl2aezM9Vq_aFTQ.ttf
fonts.gstatic.com/s/lato/v13/ |
58 KB 29 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
-_Ctzj9b56b8RgXW8FAriS3USBnSvpkopQaUR-2r7iU.ttf
fonts.gstatic.com/s/raleway/v11/ |
53 KB 25 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bIcY3_3JNqUVRAQQRNVteQ.ttf
fonts.gstatic.com/s/raleway/v11/ |
52 KB 25 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
mscsconsult.com/dox/directxxz/assets/fonts/ |
70 KB 70 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Office 365 (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
mscsconsult.com
136.243.43.135
2a00:1450:4001:811::2003
2a00:1450:4001:811::200a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