jdanielcook.net
Open in
urlscan Pro
208.97.150.110
Malicious Activity!
Public Scan
Effective URL: https://jdanielcook.net/wp-includes/css/flle/
Submission: On July 17 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 9th 2018. Valid for: 3 months.
This is the only time jdanielcook.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2400:cb00:204... 2400:cb00:2048:1::6812:2101 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
4 4 | 184.168.131.241 184.168.131.241 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
23 | 208.97.150.110 208.97.150.110 | 26347 (DREAMHOST-AS) (DREAMHOST-AS - New Dream Network) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
9 | 2a02:26f0:6c0... 2a02:26f0:6c00:28e::38f3 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 2a02:26f0:6c0... 2a02:26f0:6c00:28a::753 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
43 | 5 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
click.on.this.verylegit.link |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-184-168-131-241.ip.secureserver.net
www.go2l.ink |
ASN26347 (DREAMHOST-AS - New Dream Network, LLC, US)
PTR: apache2-jolly.pike.dreamhost.com
jdanielcook.net |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
jdanielcook.net
jdanielcook.net |
5 MB |
9 |
msocdn.com
weuofficehome.msocdn.com |
38 KB |
7 |
office365.com
r4.res.office365.com |
702 KB |
4 |
go2l.ink
4 redirects
www.go2l.ink |
543 B |
2 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
293 KB |
1 |
verylegit.link
1 redirects
click.on.this.verylegit.link |
491 B |
0 |
Failed
function sub() { [native code] }. Failed |
|
43 | 7 |
Domain | Requested by | |
---|---|---|
23 | jdanielcook.net |
jdanielcook.net
|
9 | weuofficehome.msocdn.com |
jdanielcook.net
|
7 | r4.res.office365.com |
jdanielcook.net
|
4 | www.go2l.ink | 4 redirects |
2 | secure.aadcdn.microsoftonline-p.com |
jdanielcook.net
|
1 | click.on.this.verylegit.link | 1 redirects |
0 | gppongmhjkpfnbhagpmjfkannfbllamg Failed |
jdanielcook.net
|
0 | akdgnmcogleenhbclghghlkkdndkjdjc Failed |
jdanielcook.net
|
43 | 8 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jdanielcook.net Let's Encrypt Authority X3 |
2018-07-09 - 2018-10-07 |
3 months | crt.sh |
This page contains 4 frames:
Primary Page:
https://jdanielcook.net/wp-includes/css/flle/
Frame ID: 521978FF606661D44550300683D5BE0D
Requests: 11 HTTP requests in this frame
Frame:
https://jdanielcook.net/wp-includes/css/flle/index_files/prefetch.html
Frame ID: 4F76208A90BFC838BD48E30359AC45D3
Requests: 12 HTTP requests in this frame
Frame:
https://jdanielcook.net/wp-includes/css/flle/index_files/prefetch(1).html
Frame ID: 0249F8984493359F327512DFF073FB11
Requests: 15 HTTP requests in this frame
Frame:
https://jdanielcook.net/wp-includes/css/flle/index_files/share.html
Frame ID: 4B2EF2C69EF7C088355207A78717AFCE
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://click.on.this.verylegit.link/test40cracked=6.gif.zip.docm
HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
https://jdanielcook.net/wp-includes/css/flle/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
webpack (Miscellaneous) Expand
Detected patterns
- env /^webpackJsonp$/i
Page Statistics
13 Outgoing links
These are links going to different origins than the main page.
Title: 7
Search URL Search Domain Scan URL
Title: 0
Search URL Search Domain Scan URL
Title: 3.52M
Search URL Search Domain Scan URL
Title: n/a
Search URL Search Domain Scan URL
Title: 60
Search URL Search Domain Scan URL
Title: 2010|11|25
Search URL Search Domain Scan URL
Title: 0
Search URL Search Domain Scan URL
Title: n/a
Search URL Search Domain Scan URL
Title: whois
Search URL Search Domain Scan URL
Title: Site auditn/a
Search URL Search Domain Scan URL
Title: Create one!
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://click.on.this.verylegit.link/test40cracked=6.gif.zip.docm
HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
http://www.go2l.ink/Vertical4 HTTP 302
https://jdanielcook.net/wp-includes/css/flle/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
43 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
jdanielcook.net/wp-includes/css/flle/ Redirect Chain
|
39 KB 39 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.login.min.css
jdanielcook.net/wp-includes/css/flle/index_files/ |
85 KB 86 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
convergedlogin_pcore.min.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ |
422 KB 422 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
convergedloginpaginatedstrings-en.min.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ |
11 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
seoquake-icon.svg
akdgnmcogleenhbclghghlkkdndkjdjc/static/svg/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
jdanielcook.net/wp-includes/css/flle/index_files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
jdanielcook.net/wp-includes/css/flle/index_files/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
jdanielcook.net/wp-includes/css/flle/index_files/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
inject.js
gppongmhjkpfnbhagpmjfkannfbllamg/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.html
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4F76 |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.7261.9/content/images/backgrounds/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.7261.9/content/images/backgrounds/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sharedfontstyles.css
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4F76 |
79 KB 79 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
staticStylesFluent.css
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4F76 |
41 KB 42 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
document-sprite.png
weuofficehome.msocdn.com/s/fab5fe9a/Areas/Home/Content/images/ Frame 4F76 |
0 19 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
zero-docs-sprite.png
weuofficehome.msocdn.com/s/398b5c2a/Areas/Home/Content/images/ Frame 4F76 |
0 18 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
polyfills-bundle.js
weuofficehome.msocdn.com/s/f5628679/Areas/Home/Content/js/build/bundles/ Frame 4F76 |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
vendor-bundle.js
weuofficehome.msocdn.com/s/a9879eee/Areas/Home/Content/js/build/bundles/ Frame 4F76 |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
staticscripts.js
weuofficehome.msocdn.com/s/b29e92f2/Areas/Home/Content/js/build/bundles/ Frame 4F76 |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sharedscripts.js
weuofficehome.msocdn.com/s/95c1c770/Areas/Home/Content/js/build/bundles/ Frame 4F76 |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
app-bundle.js
weuofficehome.msocdn.com/s/1da70c60/Areas/Home/Content/js/build/bundles/ Frame 4F76 |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
react-bundle.js
weuofficehome.msocdn.com/s/7c18fcc8/Areas/Home/Content/js/build/bundles/ Frame 4F76 |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
header-default-desktop.svg
weuofficehome.msocdn.com/s/c3caee40/Areas/Home/Content/images/fluent-background-sources/ Frame 4F76 |
0 2 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch(1).html
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
share.html
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4B2E |
59 KB 59 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.0.mouse.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
643 KB 644 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.1.mouse.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
640 KB 640 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.2.mouse.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
643 KB 643 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.3.mouse.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
641 KB 641 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.png
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
16 KB 17 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.css
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
7 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.mouse.css
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 0249 |
227 KB 227 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
odbshare-c20b26d1.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4B2E |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
knockout-b324ae36.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4B2E |
64 KB 64 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
odbshare.resx-5dc18d10.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4B2E |
53 KB 54 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
react-e173c92e.js.download
jdanielcook.net/wp-includes/css/flle/index_files/ Frame 4B2E |
147 KB 148 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/16.2156.8.2493367/scripts/ Frame 0249 |
643 KB 175 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/16.2156.8.2493367/scripts/ Frame 0249 |
640 KB 158 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/16.2156.8.2493367/scripts/ Frame 0249 |
643 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/16.2156.8.2493367/scripts/ Frame 0249 |
641 KB 142 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite1.mouse.png
r4.res.office365.com/owa/prem/16.2156.8.2493367/resources/images/0/ Frame 0249 |
16 KB 16 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite1.mouse.css
r4.res.office365.com/owa/prem/16.2156.8.2493367/resources/images/0/ Frame 0249 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/16.2156.8.2493367/resources/styles/0/ Frame 0249 |
227 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- akdgnmcogleenhbclghghlkkdndkjdjc
- URL
- chrome-extension://akdgnmcogleenhbclghghlkkdndkjdjc/static/svg/seoquake-icon.svg
- Domain
- gppongmhjkpfnbhagpmjfkannfbllamg
- URL
- chrome-extension://gppongmhjkpfnbhagpmjfkannfbllamg/js/inject.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| $Debug object| $Do function| webpackJsonp object| StringRepository boolean| __1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jdanielcook.net/ | Name: OWAPF Value: p:undefined11111111& |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
akdgnmcogleenhbclghghlkkdndkjdjc
click.on.this.verylegit.link
gppongmhjkpfnbhagpmjfkannfbllamg
jdanielcook.net
r4.res.office365.com
secure.aadcdn.microsoftonline-p.com
weuofficehome.msocdn.com
www.go2l.ink
akdgnmcogleenhbclghghlkkdndkjdjc
gppongmhjkpfnbhagpmjfkannfbllamg
184.168.131.241
208.97.150.110
2400:cb00:2048:1::6812:2101
2a02:26f0:6c00:283::35c1
2a02:26f0:6c00:28a::753
2a02:26f0:6c00:28e::38f3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