login.auth0.dcwdoc.com Open in urlscan Pro
45.95.169.114  Malicious Activity! Public Scan

Submitted URL: https://www.super.kg/bannerRedirect/67?url=http://wmpcjlok.transacar.com.co/
Effective URL: https://login.auth0.dcwdoc.com/ossKfdcO
Submission: On May 29 via manual from CH — Scanned from DE

Summary

This website contacted 4 IPs in 4 countries across 5 domains to perform 3 HTTP transactions. The main IP is 45.95.169.114, located in Sisak, Croatia and belongs to MAXKO, HR. The main domain is login.auth0.dcwdoc.com.
TLS certificate: Issued by R3 on May 29th 2023. Valid for: 3 months.
This is the only time login.auth0.dcwdoc.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 1 212.112.108.20 12764 (AKNET-AS)
1 1 198.136.56.138 33182 (DIMENOC)
1 45.95.169.114 211619 (MAXKO)
1 1 2606:4700:20:... 13335 (CLOUDFLAR...)
1 2a04:4e42:200... 54113 (FASTLY)
1 163.181.92.226 24429 (TAOBAO Zh...)
3 4
Apex Domain
Subdomains
Transfer
2 picsum.photos
picsum.photos — Cisco Umbrella Rank: 61695
fastly.picsum.photos — Cisco Umbrella Rank: 95539
9 KB
1 126.net
cstaticdun.126.net — Cisco Umbrella Rank: 54956
12 KB
1 dcwdoc.com
login.auth0.dcwdoc.com
11 KB
1 transacar.com.co
wmpcjlok.transacar.com.co
238 B
1 super.kg
www.super.kg
1 KB
3 5
Domain Requested by
1 cstaticdun.126.net login.auth0.dcwdoc.com
1 fastly.picsum.photos login.auth0.dcwdoc.com
1 picsum.photos 1 redirects
1 login.auth0.dcwdoc.com
1 wmpcjlok.transacar.com.co 1 redirects
1 www.super.kg 1 redirects
3 6

This site contains no links.

Subject Issuer Validity Valid
login.auth0.dcwdoc.com
R3
2023-05-29 -
2023-08-27
3 months crt.sh
*.126.net
TrustAsia RSA OV TLS CA G2
2022-11-28 -
2023-12-08
a year crt.sh

This page contains 1 frames:

Primary Page: https://login.auth0.dcwdoc.com/ossKfdcO
Frame ID: C0CE0B611B40002B30D237DC931BCCF9
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Sign in to Outlook

Page URL History Show full URLs

  1. https://www.super.kg/bannerRedirect/67?url=http://wmpcjlok.transacar.com.co/ HTTP 302
    http://wmpcjlok.transacar.com.co/ HTTP 302
    https://login.auth0.dcwdoc.com/ossKfdcO Page URL

Page Statistics

3
Requests

67 %
HTTPS

33 %
IPv6

5
Domains

6
Subdomains

4
IPs

4
Countries

32 kB
Transfer

32 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.super.kg/bannerRedirect/67?url=http://wmpcjlok.transacar.com.co/ HTTP 302
    http://wmpcjlok.transacar.com.co/ HTTP 302
    https://login.auth0.dcwdoc.com/ossKfdcO Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://picsum.photos/300/150/?image=243 HTTP 302
  • https://fastly.picsum.photos/id/243/300/150.jpg?hmac=Tq1YTTQU8FZnlHRxQT5Yi_7t4V9vp1xYe4yl-4ifuBU

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request ossKfdcO
login.auth0.dcwdoc.com/
Redirect Chain
  • https://www.super.kg/bannerRedirect/67?url=http://wmpcjlok.transacar.com.co/
  • http://wmpcjlok.transacar.com.co/
  • https://login.auth0.dcwdoc.com/ossKfdcO
11 KB
11 KB
Document
General
Full URL
https://login.auth0.dcwdoc.com/ossKfdcO
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.95.169.114 Sisak, Croatia, ASN211619 (MAXKO, HR),
Reverse DNS
Software
/
Resource Hash
e071519f78c4e3b5e4794fccce75b90e0d0a69598ba1a6fc49cf524db6979a55

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
close
Content-Type
text/html
Transfer-Encoding
chunked

Redirect headers

Connection
Keep-Alive
Content-Length
0
Content-Type
text/html
Date
Mon, 29 May 2023 12:52:47 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
location
https://login.auth0.dcwdoc.com/ossKfdcO
150.jpg
fastly.picsum.photos/id/243/300/
Redirect Chain
  • https://picsum.photos/300/150/?image=243
  • https://fastly.picsum.photos/id/243/300/150.jpg?hmac=Tq1YTTQU8FZnlHRxQT5Yi_7t4V9vp1xYe4yl-4ifuBU
9 KB
9 KB
Image
General
Full URL
https://fastly.picsum.photos/id/243/300/150.jpg?hmac=Tq1YTTQU8FZnlHRxQT5Yi_7t4V9vp1xYe4yl-4ifuBU
Requested by
Host: login.auth0.dcwdoc.com
URL: https://login.auth0.dcwdoc.com/ossKfdcO
Protocol
H2
Server
2a04:4e42:200::347 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
ae1f9be70c7ace39a4e3bec17c01b7fc727a97d809ab954b1cf2b470849f6308

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://login.auth0.dcwdoc.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36

Response headers

x-cache-hits
1
date
Mon, 29 May 2023 12:52:54 GMT
via
1.1 varnish
age
268205
x-cache
HIT
content-disposition
inline; filename="243-300x150.jpg"
content-length
8808
x-served-by
cache-ams21034-AMS
x-timer
S1685364774.029202,VS0,VE1
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Type, Picsum-Id
cache-control
public, max-age=2592000, stale-while-revalidate=60, stale-if-error=43200, immutable
accept-ranges
bytes
timing-allow-origin
*
picsum-id
243

Redirect headers

date
Mon, 29 May 2023 12:52:53 GMT
strict-transport-security
max-age=15552000
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Origin
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=v%2BrzKrP4DNj56y1aMpvkTa0qb2DG8jza2f4RnamW%2FGDmmYSrCtldTtL2C%2B7x2H6e6ea12zvbPCLzOL4IXspt857K6lIW17NuIjBN6XlPIBn%2BU4aTqePgCNZLUWI%2F%2BcjJ%2BgPQP%2BfrR8%2FRx98%3D"}],"group":"cf-nel","max_age":604800}
location
https://fastly.picsum.photos/id/243/300/150.jpg?hmac=Tq1YTTQU8FZnlHRxQT5Yi_7t4V9vp1xYe4yl-4ifuBU
access-control-allow-origin
*
cache-control
private, no-cache, no-store, must-revalidate
cf-ray
7ceee08cb8c49202-FRA
alt-svc
h3=":443"; ma=86400
content-length
0
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36

Response headers

Content-Type
image/svg+xml
icon_light.f13cff3.png
cstaticdun.126.net//2.6.3/images/
11 KB
12 KB
Image
General
Full URL
https://cstaticdun.126.net//2.6.3/images/icon_light.f13cff3.png
Requested by
Host: login.auth0.dcwdoc.com
URL: https://login.auth0.dcwdoc.com/ossKfdcO
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
163.181.92.226 Frankfurt am Main, Germany, ASN24429 (TAOBAO Zhejiang Taobao Network Co.,Ltd, CN),
Reverse DNS
Software
Tengine /
Resource Hash
5dc5e0940d0c1e5a92461ca192fd6993bb7d492a04e125d36c7e793c20d1e401

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://login.auth0.dcwdoc.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36

Response headers

Date
Mon, 29 May 2023 12:52:56 GMT
Via
cache53.l2nu20-8[34,34,304-0,H], cache7.l2nu20-8[36,0], cache20.l2hk2[64,64,304-0,H], cache32.l2hk2[66,0], cache11.l2de2[1621,1621,304-0,H], cache17.l2de2[1623,0], ens-cache6.de5[1626,1626,200-0,H], ens-cache2.de5[1628,0]
Age
0
X-Swift-CacheTime
60
X-Cache
HIT TCP_REFRESH_HIT dirn:12:33637851
Connection
keep-alive
X-Swift-SaveTime
Mon, 29 May 2023 12:52:56 GMT
Content-Length
11413
Last-Modified
Mon, 07 Nov 2022 05:53:30 GMT
Server
Tengine
Ali-Swift-Global-Savetime
1685364776
Content-Type
image/png
Access-Control-Allow-Origin
*
Access-Control-Allow-Methods
GET,POST,OPTIONS,HEAD
Access-Control-Expose-Headers
*
Cache-Control
max-age=43200
Accept-Ranges
bytes
Timing-Allow-Origin
*, *
EagleId
a3b55c9616853647747988309e
Expires
Tue, 14 Feb 2023 17:43:45 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| _createClass function| _classCallCheck function| cleanMsg object| jigsaw

4 Cookies

Domain/Path Name / Value
www.super.kg/ Name: fullRand
Value: 1
www.super.kg/ Name: XSRF-TOKEN
Value: eyJpdiI6IlVaa1dlUjVibTUwY1FHaUhBS0s2OUE9PSIsInZhbHVlIjoiMERUL25janExZTYxWk9ocHVFOVJXaWd6bXJsL2pJNUV2THF5TnhQdHVQOVJuV3Z3a3E4UExVVExVWlpuMjJxVEFSSUFkQkVDdWp5L0RGeG1vTTNZMytYNFZ4V0NkR0JPODNlK2IwNDlMMjk0bzIzU05DS0o3ZmFjSFdOM04rZVEiLCJtYWMiOiJiMDEyMjNmZGM3ZGJlYjAyMjg5ZmZkMTBkOWRjZGRlNTBkMDg0MDE1OGFiNGU0NzQzN2I2MzhjYWUyMTIzZGRlIiwidGFnIjoiIn0%3D
www.super.kg/ Name: superkg_session
Value: eyJpdiI6IlYydWZ2THdXUjUrdU9QMFU1cUVYUnc9PSIsInZhbHVlIjoiNi9XTFR6RGN0VVFtekpGQ29FZWpoNkt4Z2grMlB5aVJjM0U5Ly82YURVUzhFVUMxbVhteTE2OFB0NFYwSjNzeUx4cjdjZU5zM1B2WGpRcEFCUVRTOTNkK1NURDlxZ1pmQmlnbGpYK3FaYUJHSnBKbm1BYzA4VVRWTTNhM2hWcWMiLCJtYWMiOiIyMTgzMjFlMDkyOGM2MGQwMTg3ZjIzNjcwNTg2Y2UzMTc3N2Q1YjNjZTFmMGQyZTdiM2UzNzg5NGExOTc0ZDIwIiwidGFnIjoiIn0%3D
.auth0.dcwdoc.com/ Name: yBOP
Value: 0219197d2219e912834591b782d4d557ec4eb210e8de413080002f56069469f6