danny-williamson.com
Open in
urlscan Pro
185.202.172.240
Malicious Activity!
Public Scan
Submission: On May 18 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on May 18th 2022. Valid for: 3 months.
This is the only time danny-williamson.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 185.202.172.240 185.202.172.240 | 64236 (UNREAL-SE...) (UNREAL-SERVERS) | |
3 | 65.9.58.59 65.9.58.59 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 52.87.65.167 52.87.65.167 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 151.101.130.165 151.101.130.165 | 54113 (FASTLY) (FASTLY) | |
1 | 192.229.233.122 192.229.233.122 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 6 |
ASN64236 (UNREAL-SERVERS, US)
PTR: howardwatches.com
danny-williamson.com |
ASN16509 (AMAZON-02, US)
PTR: server-65-9-58-59.fra56.r.cloudfront.net
d1di2lzuh97fh2.cloudfront.net |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-87-65-167.compute-1.amazonaws.com
cumanagement.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
cloudfront.net
d1di2lzuh97fh2.cloudfront.net |
177 KB |
3 |
danny-williamson.com
1 redirects
danny-williamson.com |
6 KB |
1 |
mlsmortgage.com
www.mlsmortgage.com |
46 KB |
1 |
dreamstime.com
thumbs.dreamstime.com — Cisco Umbrella Rank: 12123 |
82 KB |
1 |
idgesg.net
images.idgesg.net — Cisco Umbrella Rank: 94551 |
17 KB |
1 |
cumanagement.com
cumanagement.com |
56 KB |
9 | 6 |
Domain | Requested by | |
---|---|---|
3 | d1di2lzuh97fh2.cloudfront.net |
danny-williamson.com
d1di2lzuh97fh2.cloudfront.net |
3 | danny-williamson.com |
1 redirects
danny-williamson.com
|
1 | www.mlsmortgage.com |
danny-williamson.com
|
1 | thumbs.dreamstime.com |
danny-williamson.com
|
1 | images.idgesg.net |
danny-williamson.com
|
1 | cumanagement.com |
danny-williamson.com
|
9 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmail.danny-williamson.com R3 |
2022-05-18 - 2022-08-16 |
3 months | crt.sh |
*.cloudfront.net Amazon |
2022-02-01 - 2023-01-31 |
a year | crt.sh |
*.cumanagement.com Network Solutions OV Server CA 2 |
2020-07-21 - 2022-09-10 |
2 years | crt.sh |
idgesg.net R3 |
2022-03-30 - 2022-06-28 |
3 months | crt.sh |
*.dreamstime.com DigiCert SHA2 Secure Server CA |
2020-07-14 - 2022-07-19 |
2 years | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-07-09 - 2022-07-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://danny-williamson.com/Doc/
Frame ID: F244ABB849C0177C1AFA04D35B1FF366
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Closing DisclosurePage URL History Show full URLs
-
https://danny-williamson.com/Doc
HTTP 301
https://danny-williamson.com/Doc/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://danny-williamson.com/Doc
HTTP 301
https://danny-williamson.com/Doc/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
danny-williamson.com/Doc/ Redirect Chain
|
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1g0f0h.css
d1di2lzuh97fh2.cloudfront.net/files/1g/1g0/ |
486 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Managing_Mortgages.jpg
cumanagement.com/sites/default/files/2018-11/ |
56 KB 56 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft-office-365-logo-2016-100727915-large.jpg
images.idgesg.net/images/article/2017/06/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
keys-model-house-real-estate-buying-apartment-mortgage-sale-contribution-113093377.jpg
thumbs.dreamstime.com/z/ |
82 KB 82 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email-logos.fw_.png
danny-williamson.com/Doc/url(https:/fastsms.co.uk/wp-content/uploads/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Know-Before-You-Owe-Blank-Disclosures-Featured-720x380.jpg
www.mlsmortgage.com/wp-content/uploads/ |
45 KB 46 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
20dpjc.woff2
d1di2lzuh97fh2.cloudfront.net/files/20/20d/ |
63 KB 64 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3ncu8u.woff2
d1di2lzuh97fh2.cloudfront.net/files/3n/3nc/ |
63 KB 63 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails object| el0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cumanagement.com
d1di2lzuh97fh2.cloudfront.net
danny-williamson.com
images.idgesg.net
thumbs.dreamstime.com
www.mlsmortgage.com
151.101.130.165
185.202.172.240
192.229.233.122
2a06:98c1:3121::a
52.87.65.167
65.9.58.59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