linkcomp.com.br
Open in
urlscan Pro
184.107.67.241
Malicious Activity!
Public Scan
Submission: On December 14 via api from CA
Summary
This is the only time linkcomp.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 184.107.67.241 184.107.67.241 | 32613 (IWEB-AS) (IWEB-AS - iWeb Technologies Inc.) | |
2 | 2a02:26f0:122... 2a02:26f0:122:399::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
9 | 92.123.92.114 92.123.92.114 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
27 | 3 |
ASN32613 (IWEB-AS - iWeb Technologies Inc., CA)
PTR: server15.integrator.com.br
linkcomp.com.br |
ASN20940 (AKAMAI-ASN1, US)
PTR: a92-123-92-114.deploy.akamaitechnologies.com
r4.res.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
linkcomp.com.br
linkcomp.com.br |
3 MB |
9 |
office365.com
r4.res.office365.com |
822 KB |
2 |
gfx.ms
auth.gfx.ms |
292 KB |
27 | 3 |
Domain | Requested by | |
---|---|---|
16 | linkcomp.com.br |
linkcomp.com.br
|
9 | r4.res.office365.com |
linkcomp.com.br
|
2 | auth.gfx.ms |
linkcomp.com.br
|
27 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
login.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
msagfx.live.com Microsoft IT TLS CA 4 |
2017-07-27 - 2019-07-17 |
2 years | crt.sh |
*.res.outlook.com Microsoft IT TLS CA 5 |
2017-11-27 - 2019-11-27 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password.html
Frame ID: (FB633D69118E7BBF1E5D8E6B0C1F61B)
Requests: 8 HTTP requests in this frame
Frame:
http://linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/prefetch.html
Frame ID: (76816A5D5E1140529704F0BC2DC78F1)
Requests: 19 HTTP requests in this frame
Screenshot
Detected technologies
OpenSSL (Web Server Extensions) ExpandDetected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: reset it now.
Search URL Search Domain Scan URL
Title: Sign in with a different Microsoft account
Search URL Search Domain Scan URL
Title: Terms of Use
Search URL Search Domain Scan URL
Title: Privacy & Cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password.html
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/ |
35 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged1033.css
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ |
85 KB 85 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ConvergedLoginPaginatedStrings.EN.js.download
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ |
13 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ConvergedLogin_PCore.js.download
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ |
255 KB 255 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account_msa.svg
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ |
379 B 379 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
auth.gfx.ms/16.000.27457.501/images/Backgrounds/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.27457.501/images/Backgrounds/ |
291 KB 291 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.html
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
3 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.0.mouse.js.download
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
631 KB 631 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.1.mouse.js.download
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
628 KB 628 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.2.mouse.js.download
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
633 KB 633 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.3.mouse.js.download
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
627 KB 627 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.png
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
16 KB 16 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.css
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.mouse.css
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/Sign%20in%20to%20your%20Microsoft%20account%20wrong%20password_files/ Frame (768 |
192 KB 192 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/16.1850.9.2353233/scripts/ Frame (768 |
631 KB 171 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
office365icons.woff
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/fonts/ Frame (768 |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/16.1850.9.2353233/scripts/ Frame (768 |
628 KB 156 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/16.1850.9.2353233/scripts/ Frame (768 |
633 KB 163 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
office365icons.ttf
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf/fonts/ Frame (768 |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/16.1850.9.2353233/scripts/ Frame (768 |
627 KB 137 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
r4.res.office365.com/owa/prem/16.1850.9.2353233/resources/images/0/ Frame (768 |
16 KB 16 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.css
r4.res.office365.com/owa/prem/16.1850.9.2353233/resources/images/0/ Frame (768 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/16.1850.9.2353233/resources/styles/0/ Frame (768 |
192 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office365icons.woff
r4.res.office365.com/owa/prem/16.1850.9.2353233/resources/styles/fonts/ Frame (768 |
75 KB 75 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office365icons.woff
r4.res.office365.com/owa/prem/16.1850.9.2353233/resources/styles/fonts/ Frame (768 |
75 KB 75 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint object| PROOF number| g_iSRSFailed string| g_sSRSSuccess function| SRSRetry object| g_dtFirstByte object| g_objPageMode object| ServerData object| StringRepository boolean| __ConvergedLoginPaginatedStrings function| webpackJsonp object| ko boolean| __ConvergedLogin_PCore function| SetTileUrl2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
linkcomp.com.br/ | Name: OWAPF Value: p:undefined111111111&:undefined& |
|
linkcomp.com.br/okhsbs/fzshttre/sezrf/sdfzasdsfdf | Name: CkTst Value: G1513264775309 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
linkcomp.com.br
r4.res.office365.com
184.107.67.241
2a02:26f0:122:399::34ef
92.123.92.114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