hectoryebra53.com
Open in
urlscan Pro
195.154.194.174
Malicious Activity!
Public Scan
Submission: On November 18 via manual from HK
Summary
This is the only time hectoryebra53.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 195.154.194.174 195.154.194.174 | 12876 (Online SAS) (Online SAS) | |
3 | 54.240.168.49 54.240.168.49 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700:20:... 2606:4700:20::681a:725 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::200e | 15169 (GOOGLE) (GOOGLE) | |
6 | 4 |
ASN12876 (Online SAS, FR)
PTR: server12.elitecomunicacion.es
hectoryebra53.com |
ASN16509 (AMAZON-02, US)
PTR: server-54-240-168-49.ams54.r.cloudfront.net
d1di2lzuh97fh2.cloudfront.net |
ASN13335 (CLOUDFLARENET, US)
pronto-core-cdn.prontomarketing.com |
ASN15169 (GOOGLE, US)
encrypted-tbn0.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
cloudfront.net
d1di2lzuh97fh2.cloudfront.net |
176 KB |
1 |
gstatic.com
encrypted-tbn0.gstatic.com |
7 KB |
1 |
prontomarketing.com
pronto-core-cdn.prontomarketing.com |
4 KB |
1 |
hectoryebra53.com
hectoryebra53.com |
2 KB |
6 | 4 |
Domain | Requested by | |
---|---|---|
3 | d1di2lzuh97fh2.cloudfront.net |
hectoryebra53.com
d1di2lzuh97fh2.cloudfront.net |
1 | encrypted-tbn0.gstatic.com |
hectoryebra53.com
|
1 | pronto-core-cdn.prontomarketing.com |
hectoryebra53.com
|
1 | hectoryebra53.com | |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.cloudfront.net DigiCert Global CA G2 |
2020-05-26 - 2021-04-21 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-07 - 2021-08-07 |
a year | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-10-28 - 2021-01-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://hectoryebra53.com/ALTA.htm
Frame ID: 567567F45786B47C4D029F0AED04BEB7
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
ALTA.htm
hectoryebra53.com/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1g0f0h.css
d1di2lzuh97fh2.cloudfront.net/files/1g/1g0/ |
486 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Ofc365_MSNews.png
pronto-core-cdn.prontomarketing.com/2/wp-content/uploads/sites/33/2017/10/ |
3 KB 4 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
images
encrypted-tbn0.gstatic.com/ |
6 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
20dpjc.woff2
d1di2lzuh97fh2.cloudfront.net/files/20/20d/ |
63 KB 64 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3ncu8u.woff2
d1di2lzuh97fh2.cloudfront.net/files/3n/3nc/ |
63 KB 63 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| el0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d1di2lzuh97fh2.cloudfront.net
encrypted-tbn0.gstatic.com
hectoryebra53.com
pronto-core-cdn.prontomarketing.com
195.154.194.174
2606:4700:20::681a:725
2a00:1450:4001:803::200e
54.240.168.49
0af6462e9757f6fb4a8b829ef12c3c266767aa8892850460ca5bdda5906fcf02
1d8f5280afb7f4fa0db5cdfcb751e180788b0f0da1488309c4243ebff11a9591
25744fb93b0cbaff15a8537a47d1db5b3c12ceef7721ac8498606752ec77fd35
2aab7eceb12d61aac26a9dde36be343896e4f44ba8001d308136ce1506247df6
405d34d02a1cbb0605b544e1a0ebfe9249fb849bcf15a9bce978f1783e4b9bd8
47107401d0adb375ab9aa167f9d62489a849d510e740a307b5a4db60e5db3562