px.fyi
Open in
urlscan Pro
68.66.232.62
Malicious Activity!
Public Scan
Submission: On April 28 via api from AU
Summary
TLS certificate: Issued by R3 on April 21st 2021. Valid for: 3 months.
This is the only time px.fyi was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 68.66.232.62 68.66.232.62 | 55293 (A2HOSTING) (A2HOSTING) | |
1 2 | 162.0.214.31 162.0.214.31 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
3 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
14 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
msauth.net
logincdn.msauth.net |
458 KB |
3 |
cloudflare.com
cdnjs.cloudflare.com |
40 KB |
2 |
lightsoutbeerco.com
1 redirects
lightsoutbeerco.com |
61 KB |
1 |
heyskip.com
heyskip.com |
28 KB |
1 |
px.fyi
px.fyi |
2 KB |
14 | 5 |
Domain | Requested by | |
---|---|---|
8 | logincdn.msauth.net |
lightsoutbeerco.com
|
3 | cdnjs.cloudflare.com |
lightsoutbeerco.com
|
2 | lightsoutbeerco.com |
1 redirects
px.fyi
|
1 | heyskip.com |
px.fyi
|
1 | px.fyi | |
14 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
hacklink.market |
spyhackerz.org |
hdizlefilmleri.com |
www.porngooo.com |
nulled.zone |
gsmnakliyat.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
goto.mrdzyn.studio R3 |
2021-04-21 - 2021-07-20 |
3 months | crt.sh |
www.lightsoutbeerco.com R3 |
2021-04-28 - 2021-07-27 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
identitycdn.msauth.net DigiCert SHA2 Secure Server CA |
2020-07-20 - 2021-07-20 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://px.fyi/fWp
Frame ID: A80D3879AE9029FC49F24A44EBE1F7DF
Requests: 2 HTTP requests in this frame
Frame:
https://lightsoutbeerco.com/uNet/0ff313/p0rt/
Frame ID: 69150FD0AA785926132BE6B3836F71DE
Requests: 12 HTTP requests in this frame
8 Outgoing links
These are links going to different origins than the main page.
Title: hacklink al
Search URL Search Domain Scan URL
Title: hack forum
Search URL Search Domain Scan URL
Title: iyi oyun izle
Search URL Search Domain Scan URL
Title: narcos izle
Search URL Search Domain Scan URL
Title: karlar ülkesi 2 izle
Search URL Search Domain Scan URL
Title: porn
Search URL Search Domain Scan URL
Title: nulled wordpress themes
Search URL Search Domain Scan URL
Title: ankara evden eve nakliyat
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://lightsoutbeerco.com/uNet/0ff313/p0rt HTTP 301
- https://lightsoutbeerco.com/uNet/0ff313/p0rt/
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
fWp
px.fyi/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
heyskip.com/static/js/ |
82 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
lightsoutbeerco.com/uNet/0ff313/p0rt/ Frame 6915 Redirect Chain
|
61 KB 61 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/ Frame 6915 |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.validate.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.19.0/ Frame 6915 |
24 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.19.0/ Frame 6915 |
22 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged_v21033_G6gnkW-92CN8JvITKNKF3g2.css
logincdn.msauth.net/16.000/ Frame 6915 |
98 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLoginPaginatedStrings.en_EmWJezhbhqxEPyIjFek5wQ2.js
logincdn.msauth.net/16.000/ Frame 6915 |
29 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLogin_PCore_DJSTSvHRjHpsuIZIVqYF7w2.js
logincdn.msauth.net/16.000/ Frame 6915 |
573 KB 149 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
logincdn.msauth.net/16.000.28394.11/images/ Frame 6915 |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0-small.jpg
logincdn.msauth.net/16.000.28394.11/images/Backgrounds/ Frame 6915 |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0.jpg
logincdn.msauth.net/16.000.28394.11/images/Backgrounds/ Frame 6915 |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white.svg
logincdn.msauth.net/16.000.28394.11/images/ Frame 6915 |
915 B 393 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey.svg
logincdn.msauth.net/16.000.28394.11/images/ Frame 6915 |
915 B 391 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery string| appurl string| token0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
heyskip.com
lightsoutbeerco.com
logincdn.msauth.net
px.fyi
162.0.214.31
192.229.221.185
2606:4700::6810:135e
68.66.232.62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