xrdcv.com
Open in
urlscan Pro
93.157.62.147
Malicious Activity!
Public Scan
Effective URL: https://xrdcv.com/access-validate/authorize_client_id:t9shkrl5-ig9d-5fsw-6ir8-j48iubck6r7p_496soegqa1fvpk5nz7by8cl...
Submission: On October 28 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 28th 2021. Valid for: 3 months.
This is the only time xrdcv.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 199.30.234.133 199.30.234.133 | 13380 (ASN-CUST) (ASN-CUST) | |
2 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 69.16.175.42 69.16.175.42 | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 14 | 93.157.62.147 93.157.62.147 | 43350 (NFORCE) (NFORCE) | |
18 | 4 |
ASN20446 (HIGHWINDS3, US)
PTR: tlb.hwcdn.net
code.jquery.com |
ASN43350 (NFORCE, NL)
PTR: greyfort.zillionboost.top
vrp634vrp.verizon.com.idemia-nss.sozih.com | |
xrdcv.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
xrdcv.com
1 redirects
xrdcv.com |
304 KB |
3 |
edgepilot.com
1 redirects
link.edgepilot.com |
4 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
31 KB |
1 |
sozih.com
vrp634vrp.verizon.com.idemia-nss.sozih.com |
7 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
18 | 5 |
Domain | Requested by | |
---|---|---|
13 | xrdcv.com |
1 redirects
vrp634vrp.verizon.com.idemia-nss.sozih.com
xrdcv.com |
3 | link.edgepilot.com |
1 redirects
link.edgepilot.com
|
2 | maxcdn.bootstrapcdn.com |
link.edgepilot.com
|
1 | vrp634vrp.verizon.com.idemia-nss.sozih.com | |
1 | code.jquery.com |
link.edgepilot.com
|
18 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.edgepilot.com DigiCert SHA2 Secure Server CA |
2020-04-14 - 2022-06-22 |
2 years | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
xrdcv.com R3 |
2021-10-28 - 2022-01-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://xrdcv.com/access-validate/authorize_client_id:t9shkrl5-ig9d-5fsw-6ir8-j48iubck6r7p_496soegqa1fvpk5nz7by8clw302dxuhjritm5qva3xnyk8b1hzi0o7wt9j4rdc6fguml2pesolbetmpdrw39za67u1hik2gq80cs54vxnjyf?data=am9lLnJvbWFnbm9saUBpZGVtaWEtbnNzLmNvbQ==
Frame ID: 33BD809CBBCF6A4B7FD93F4CE5AAF320
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
verify your emailPage URL History Show full URLs
- https://link.edgepilot.com/s/88826bd2/uSQJefKPBEGii5OuIXw8jQ?u=http://vrp634vrp.verizon.com.idemia-nss.... Page URL
-
https://link.edgepilot.com/filter
HTTP 302
http://vrp634vrp.verizon.com.idemia-nss.sozih.com/94RA2RA/joe.romagnoli.verizon.com&p2=WXNESQ-RQLPNTF_NA_HWXBM-1&p3=OEM_New_BAU Page URL
-
https://xrdcv.com/access-validate/?joe.romagnoli@idemia-nss.com
HTTP 302
https://xrdcv.com/access-validate/authorize_client_id:t9shkrl5-ig9d-5fsw-6ir8-j48iubck6r7p_496... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://link.edgepilot.com/s/88826bd2/uSQJefKPBEGii5OuIXw8jQ?u=http://vrp634vrp.verizon.com.idemia-nss.sozih.com/94RA2RA/joe.romagnoli.verizon.com%26p2=WXNESQ-RQLPNTF_NA_HWXBM-1%26p3=OEM_New_BAU%23am9lLnJvbWFnbm9saUBpZGVtaWEtbnNzLmNvbQ=%3D Page URL
-
https://link.edgepilot.com/filter
HTTP 302
http://vrp634vrp.verizon.com.idemia-nss.sozih.com/94RA2RA/joe.romagnoli.verizon.com&p2=WXNESQ-RQLPNTF_NA_HWXBM-1&p3=OEM_New_BAU Page URL
-
https://xrdcv.com/access-validate/?joe.romagnoli@idemia-nss.com
HTTP 302
https://xrdcv.com/access-validate/authorize_client_id:t9shkrl5-ig9d-5fsw-6ir8-j48iubck6r7p_496soegqa1fvpk5nz7by8clw302dxuhjritm5qva3xnyk8b1hzi0o7wt9j4rdc6fguml2pesolbetmpdrw39za67u1hik2gq80cs54vxnjyf?data=am9lLnJvbWFnbm9saUBpZGVtaWEtbnNzLmNvbQ== Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://link.edgepilot.com/filter HTTP 302
- http://vrp634vrp.verizon.com.idemia-nss.sozih.com/94RA2RA/joe.romagnoli.verizon.com&p2=WXNESQ-RQLPNTF_NA_HWXBM-1&p3=OEM_New_BAU
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
uSQJefKPBEGii5OuIXw8jQ
link.edgepilot.com/s/88826bd2/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
link.edgepilot.com/css/ |
819 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
joe.romagnoli.verizon.com&p2=WXNESQ-RQLPNTF_NA_HWXBM-1&p3=OEM_New_BAU
vrp634vrp.verizon.com.idemia-nss.sozih.com/94RA2RA/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
authorize_client_id:t9shkrl5-ig9d-5fsw-6ir8-j48iubck6r7p_496soegqa1fvpk5nz7by8clw302dxuhjritm5qva3xnyk8b1hzi0o7wt9j4rdc6fguml2pesolbetmpdrw39za67u1hik2gq80cs54vxnjyf
xrdcv.com/access-validate/ Redirect Chain
|
26 KB 26 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
xrdcv.com/access-validate/css/ |
94 KB 94 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left.svg
xrdcv.com/access-validate/images/ |
513 B 759 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enterpass.png
xrdcv.com/access-validate/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
firstmsg1.png
xrdcv.com/access-validate/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
forgpass.png
xrdcv.com/access-validate/images/ |
713 B 955 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
xrdcv.com/access-validate/images/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
xrdcv.com/access-validate/images/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
api.php
xrdcv.com/access-validate/ |
161 B 477 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
inv-big-background.png
xrdcv.com/access-validate/images/ |
171 KB 171 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
passwrd.png
xrdcv.com/access-validate/images/ |
902 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sigin.png
xrdcv.com/access-validate/images/ |
736 B 977 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler string| statos string| actnn string| actnn2 string| rndstr1 string| rndstr2 string| haserr string| plchol string| plchol2 string| arrl string| licensekey string| emailkey object| style function| checkdom object| xTag string| pagetype string| trl string| htmlinp string| htmlinp2 string| locathref string| params function| makeInputHere function| validateForm function| submitForm function| onkeypressFunction object| r object| xmlhttp1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
xrdcv.com/ | Name: PHPSESSID Value: 007aad58f2e32afaf6ac9a475e83935b |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
link.edgepilot.com
maxcdn.bootstrapcdn.com
vrp634vrp.verizon.com.idemia-nss.sozih.com
xrdcv.com
104.18.10.207
199.30.234.133
69.16.175.42
93.157.62.147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