jiguan.in
Open in
urlscan Pro
204.11.58.86
Malicious Activity!
Public Scan
Submission: On July 08 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 8th 2023. Valid for: 3 months.
This is the only time jiguan.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 204.11.58.86 204.11.58.86 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
7 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
1 | 40.126.32.138 40.126.32.138 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
12 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 204-11-58-86.unifiedlayer.com
jiguan.in |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1175 |
66 KB |
3 |
jiguan.in
jiguan.in |
77 KB |
1 |
live.com
login.live.com — Cisco Umbrella Rank: 89 |
|
0 |
Failed
function sub() { [native code] }. Failed |
|
12 | 4 |
Domain | Requested by | |
---|---|---|
7 | aadcdn.msftauth.net |
jiguan.in
|
3 | jiguan.in |
jiguan.in
|
1 | login.live.com |
jiguan.in
|
0 | www. Failed |
jiguan.in
|
12 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
passwordreset. |
www. |
privacy. |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jiguan.in R3 |
2023-06-08 - 2023-09-06 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
login.live.com DigiCert SHA2 Secure Server CA |
2023-07-02 - 2024-07-02 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://jiguan.in/ws1.php/
Frame ID: 817A626E6235E8E9C3819D45A9A82DDD
Requests: 11 HTTP requests in this frame
Frame:
https://www./
Frame ID: 6E1BD095DE05836026897DD28CD017CB
Requests: 1 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: Forgotten my password
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jiguan.in/ws1.php/ |
33 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_kfhrfyfy-sm2tmkm5ficcw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
108 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
convergedlogin_pfetchsessionsprogress_3cdbaab1cf6d9b038234.js
aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/ |
15 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
convergedlogin_pidpdisambiguation_76e0875415977704da38.js
aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/ |
7 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
convergedlogin_ppassword_6f5648a25cfbe86f348c.js
aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/ |
20 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
jiguan.in/ws1.php/ |
33 KB 33 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 440 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Me.htm
login.live.com/ |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_kfhrfyfy-sm2tmkm5ficcw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 20 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en-gb.min_-hjcgqxfzfu0cwzblacdqq2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 12 KB |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
www./ Frame 6E1B |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
);
jiguan.in/ws1.php/ |
33 KB 33 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.
- URL
- https://www./
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend object| webpackJsonp boolean| __convergedlogin_pfetchsessionsprogress_3cdbaab1cf6d9b038234 boolean| __convergedlogin_pidpdisambiguation_76e0875415977704da38 boolean| __convergedlogin_ppassword_6f5648a25cfbe86f348c3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jiguan.in/ | Name: PHPSESSID Value: 35291d900f412d1feb641c7f2272458f |
|
.login.live.com/ | Name: uaid Value: 32edc12cfd73425b839b6924fec864ea |
|
.login.live.com/ | Name: MSPRequ Value: id=N<=1688829381&co=1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
jiguan.in
login.live.com
www.
www.
204.11.58.86
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
40.126.32.138
0140da8c4170309baa728814f96185de2c71bb6a9101d51cb040ece949aa3128
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
7cb7621f3eb49c78b89d119106cf42981a3075da154dc96af6ca24f8f68c6f53
8b6a3b17737161e5fe8c29e401372a94b8e650226cf0cd17b4c3c4de5b380b11
ab108aeaaf2e0b2b85c4415fb57ded72b22cd67f4de9b108de4521b07f258fba
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e9b270d2a6af5d01dd798963a97d66ce020da7501b55c0239c0b5d7c1d5d2375