portseattle-onlineapp-zhuz9id29.glozzom.cfd
Open in
urlscan Pro
161.35.231.220
Malicious Activity!
Public Scan
Effective URL: https://portseattle-onlineapp-zhuz9id29.glozzom.cfd/0OuHAYot?wreply=/web/login?en=signin?client_id=KC0QyM&redirect_uri=https%3A%2F%2F%2FAuth%2FPostH...
Submission: On March 10 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on March 9th 2022. Valid for: 3 months.
This is the only time portseattle-onlineapp-zhuz9id29.glozzom.cfd was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 165.232.74.215 165.232.74.215 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
6 | 161.35.231.220 161.35.231.220 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
2 | 2a02:26f0:12d... 2a02:26f0:12d:5a7::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2620:1ec:bdf::44 2620:1ec:bdf::44 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 2606:4700:303... 2606:4700:3038::6815:ead5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 152.199.23.72 152.199.23.72 | 15133 (EDGECAST) (EDGECAST) | |
15 | 8 |
ASN14061 (DIGITALOCEAN-ASN, US)
xllny-tby.reignindustry.com |
ASN14061 (DIGITALOCEAN-ASN, US)
portseattle-onlineapp-zhuz9id29.glozzom.cfd | |
nmwher.mortengass.cfd |
ASN20940 (AKAMAI-ASN1, NL)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
mortengass.cfd
nmwher.mortengass.cfd |
33 KB |
2 |
iili.io
iili.io — Cisco Umbrella Rank: 123503 |
8 KB |
2 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 2290 aadcdn.msauth.net — Cisco Umbrella Rank: 1253 |
2 KB |
2 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com — Cisco Umbrella Rank: 9244 |
2 KB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 588 |
162 KB |
1 |
msauthimages.net
aadcdn.msauthimages.net — Cisco Umbrella Rank: 3813 |
5 KB |
1 |
glozzom.cfd
portseattle-onlineapp-zhuz9id29.glozzom.cfd |
192 KB |
1 |
reignindustry.com
1 redirects
xllny-tby.reignindustry.com |
545 B |
15 | 8 |
Domain | Requested by | |
---|---|---|
5 | nmwher.mortengass.cfd |
code.jquery.com
nmwher.mortengass.cfd |
2 | iili.io | |
2 | secure.aadcdn.microsoftonline-p.com |
nmwher.mortengass.cfd
|
2 | code.jquery.com |
portseattle-onlineapp-zhuz9id29.glozzom.cfd
nmwher.mortengass.cfd |
1 | aadcdn.msauthimages.net | |
1 | aadcdn.msauth.net |
nmwher.mortengass.cfd
|
1 | logincdn.msauth.net |
nmwher.mortengass.cfd
|
1 | portseattle-onlineapp-zhuz9id29.glozzom.cfd | |
1 | xllny-tby.reignindustry.com | 1 redirects |
15 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.glozzom.cfd ZeroSSL RSA Domain Secure Site CA |
2022-03-09 - 2022-06-07 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
*.mortengass.cfd ZeroSSL RSA Domain Secure Site CA |
2022-03-09 - 2022-06-07 |
3 months | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft RSA TLS CA 02 |
2021-11-18 - 2022-11-18 |
a year | crt.sh |
identitycdn.msauth.net DigiCert SHA2 Secure Server CA |
2021-05-13 - 2022-05-13 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2022-02-22 - 2023-02-22 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-06-14 - 2022-06-13 |
a year | crt.sh |
aadcdn.msauthimages.net Microsoft Azure TLS Issuing CA 02 |
2021-06-08 - 2022-06-03 |
a year | crt.sh |
This page contains 3 frames:
Primary Page:
https://portseattle-onlineapp-zhuz9id29.glozzom.cfd/0OuHAYot?wreply=/web/login?en=signin?client_id=KC0QyM&redirect_uri=https%3A%2F%2F%2FAuth%2FPostHandler&state=CjWNywhe-qn5C-fnLc-nJ1Z-1l5zQCqcrjnj&lc=&lc&id=76yXxq&rdir=true&mkt=en-US&psi=&elld=bHl0dGxlLmxAcG9ydHNlYXR0bGUub3Jn&lw=1
Frame ID: A3544D9B65FCA90EE8C499FDABBB73D2
Requests: 2 HTTP requests in this frame
Frame:
https://nmwher.mortengass.cfd/common/index-m.php?ijbgtrf=bHl0dGxlLmxAcG9ydHNlYXR0bGUub3JnOjo1
Frame ID: 8FAF5944699480A9EC2326D954186CD3
Requests: 13 HTTP requests in this frame
Frame:
https://nmwher.mortengass.cfd/common/Sign%20in%20to%20your%20account_files/prefetch(1).html
Frame ID: 123B63DF85C0AA9ABE65646421F1BF2B
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
https://xllny-tby.reignindustry.com/LO1pfQfqtZHU9bWljJmVydD1iSGwwZEd4bExteEFjRzl5ZEhObFlYUjBiR1V1YjNKbiZtdD01pthq
HTTP 302
https://portseattle-onlineapp-zhuz9id29.glozzom.cfd/0OuHAYot?wreply=/web/login?en=signin?client_id=KC0QyM&redirect_uri=https%3A%... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://xllny-tby.reignindustry.com/LO1pfQfqtZHU9bWljJmVydD1iSGwwZEd4bExteEFjRzl5ZEhObFlYUjBiR1V1YjNKbiZtdD01pthq
HTTP 302
https://portseattle-onlineapp-zhuz9id29.glozzom.cfd/0OuHAYot?wreply=/web/login?en=signin?client_id=KC0QyM&redirect_uri=https%3A%2F%2F%2FAuth%2FPostHandler&state=CjWNywhe-qn5C-fnLc-nJ1Z-1l5zQCqcrjnj&lc=&lc&id=76yXxq&rdir=true&mkt=en-US&psi=&elld=bHl0dGxlLmxAcG9ydHNlYXR0bGUub3Jn&lw=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
0OuHAYot
portseattle-onlineapp-zhuz9id29.glozzom.cfd/ Redirect Chain
|
192 KB 192 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index-m.php
nmwher.mortengass.cfd/common/ Frame 8FAF |
41 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ Frame 8FAF |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
nmwher.mortengass.cfd/common/ Frame 8FAF |
98 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ Frame 8FAF |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left.svg
logincdn.msauth.net/16.000.28345.6/images/ Frame 8FAF |
513 B 752 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
aadcdn.msauth.net/shared/1.0/content/images/ Frame 8FAF |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ Frame 8FAF |
915 B 641 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
nmwher.mortengass.cfd/common/Sign%20in%20to%20your%20account_files/ Frame 8FAF |
127 B 127 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame 8FAF |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch(1).html
nmwher.mortengass.cfd/common/Sign%20in%20to%20your%20account_files/ Frame 123B |
127 B 339 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
bck.php
nmwher.mortengass.cfd/tools/ Frame 8FAF |
679 B 681 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1WNx5X.jpg
iili.io/ Frame 8FAF |
901 B 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1WNzen.md.jpg
iili.io/ Frame 8FAF |
6 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bannerlogo
aadcdn.msauthimages.net/dbd5a2dd-q4uhyjavkc7uhu7hpwwhvn71hmb-97dauceksayuky/logintenantbranding/0/ Frame 8FAF |
5 KB 5 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| structuredClone object| oncontextlost object| oncontextrestored string| crypt_data function| cryptor function| $ function| jQuery function| makeid function| action0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
aadcdn.msauthimages.net
code.jquery.com
iili.io
logincdn.msauth.net
nmwher.mortengass.cfd
portseattle-onlineapp-zhuz9id29.glozzom.cfd
secure.aadcdn.microsoftonline-p.com
xllny-tby.reignindustry.com
152.199.23.72
161.35.231.220
165.232.74.215
192.229.221.185
2001:4de0:ac18::1:a:2b
2606:4700:3038::6815:ead5
2620:1ec:bdf::44
2a02:26f0:12d:5a7::35c1
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0bbad1e771dace3b565cf8605aa20811bb35a075ba4375071d242972d5b59a08
1621ca5d03ed778bf3e045175c7711dda2f1487908e059bd40a65fb55a3ab178
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
3606c473e7075576741636484041bfb2636778e12255a31b1acc330016b05228
43ea8859b574e75df2c68b2729e2f0fe84ad8a9d41f43414192ed284fd916048
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
9dd254f7263118ecf4f83030e36c3f95a728d3eabfe708f8c423243a9cb9a765
a433a4f7b50f670f4d2ec4f9813cc4216265a3104d6dd4e256eefb7fcb87518e
a76c08e9cdc3bb87bfb57627ad8f6b46f0e5ef826cc7f046dfbaf25d7b7958ea
cee557ee9ea65f881b75578841133c81fc7bfd0cb8537e89ec6e308b82e4cc8d
d3a05cdf108569e6c4fd124c1738738627f29ed51a43b7b581cbce201d1aa42c
f47f03ee0e67aff8f795556d4b5e7724375fa1c25907e2e120677f4b512c5486