privatesd.pl
Open in
urlscan Pro
54.188.101.77
Malicious Activity!
Public Scan
Effective URL: https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/
Submission: On March 26 via manual from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on March 24th 2019. Valid for: 3 months.
This is the only time privatesd.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:10:... 2606:4700:10::6814:db2a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 17 | 54.188.101.77 54.188.101.77 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
7 | 2a02:26f0:6c0... 2a02:26f0:6c00:28a::753 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
21 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
tinyurl.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-188-101-77.us-west-2.compute.amazonaws.com
privatesd.pl |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
privatesd.pl
3 redirects
privatesd.pl |
3 MB |
7 |
office365.com
r4.res.office365.com |
705 KB |
1 |
tinyurl.com
1 redirects
tinyurl.com |
557 B |
21 | 3 |
Domain | Requested by | |
---|---|---|
17 | privatesd.pl |
3 redirects
privatesd.pl
|
7 | r4.res.office365.com |
privatesd.pl
|
1 | tinyurl.com | 1 redirects |
21 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
privatesd.pl cPanel, Inc. Certification Authority |
2019-03-24 - 2019-06-22 |
3 months | crt.sh |
*.res.outlook.com Microsoft IT TLS CA 5 |
2017-11-27 - 2019-11-27 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/
Frame ID: 2CD3034904CA47FCC18FFB9D285ECBBE
Requests: 6 HTTP requests in this frame
Frame:
https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/prefetch.html
Frame ID: B42689ADE4B19582F2885C9943BA8838
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://tinyurl.com/y2ygwrpa
HTTP 301
https://privatesd.pl/lu HTTP 301
https://privatesd.pl/lu/ HTTP 302
https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909 HTTP 301
https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://tinyurl.com/y2ygwrpa
HTTP 301
https://privatesd.pl/lu HTTP 301
https://privatesd.pl/lu/ HTTP 302
https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909 HTTP 301
https://privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/ Redirect Chain
|
18 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.login.min.css
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ |
87 KB 88 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loqo.png
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.html
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
;);
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/ |
356 B 356 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
back.jpg
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.0.mouse.js
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
647 KB 647 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.1.mouse.js
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
642 KB 643 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.2.mouse.js
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
645 KB 645 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.3.mouse.js
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
642 KB 643 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.png
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
16 KB 17 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.css
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
7 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.mouse.css
privatesd.pl/lu/e53f967ddd0efa80ef0e4f2ea36cf909/index_files/ Frame B426 |
227 KB 227 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/16.2236.13.2528487/scripts/ Frame B426 |
647 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/16.2236.13.2528487/scripts/ Frame B426 |
642 KB 159 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/16.2236.13.2528487/scripts/ Frame B426 |
645 KB 167 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/16.2236.13.2528487/scripts/ Frame B426 |
642 KB 142 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
r4.res.office365.com/owa/prem/16.2236.13.2528487/resources/images/0/ Frame B426 |
16 KB 16 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.css
r4.res.office365.com/owa/prem/16.2236.13.2528487/resources/images/0/ Frame B426 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/16.2236.13.2528487/resources/styles/0/ Frame B426 |
227 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
privatesd.pl/ | Name: OWAPF Value: p:undefined1& |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
privatesd.pl
r4.res.office365.com
tinyurl.com
2606:4700:10::6814:db2a
2a02:26f0:6c00:28a::753
54.188.101.77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