jukstion.duckdns.org
Open in
urlscan Pro
89.40.216.229
Malicious Activity!
Public Scan
Effective URL: https://jukstion.duckdns.org/P/off365/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e9a73292135c213ea6935ed1...
Submission Tags: 7301655
Submission: On September 24 via api from NL — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on September 24th 2021. Valid for: 3 months.
This is the only time jukstion.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 23.185.0.3 23.185.0.3 | 54113 (FASTLY) (FASTLY) | |
1 3 | 89.40.216.229 89.40.216.229 | 42695 (CNHAB) (CNHAB) | |
1 | 104.16.18.94 104.16.18.94 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 45.79.77.20 45.79.77.20 | 63949 (LINODE-AP...) (LINODE-AP Linode) | |
4 | 4 |
ASN63949 (LINODE-AP Linode, LLC, US)
PTR: li1176-20.members.linode.com
jsonip.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
duckdns.org
1 redirects
jukstion.duckdns.org |
544 KB |
2 |
pantheonsite.io
2 redirects
dev-bsawp.pantheonsite.io |
560 B |
1 |
jsonip.com
jsonip.com |
449 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
64 KB |
4 | 4 |
Domain | Requested by | |
---|---|---|
3 | jukstion.duckdns.org | 1 redirects |
2 | dev-bsawp.pantheonsite.io | 2 redirects |
1 | jsonip.com |
cdnjs.cloudflare.com
|
1 | cdnjs.cloudflare.com |
jukstion.duckdns.org
|
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jukstion.duckdns.org cPanel, Inc. Certification Authority |
2021-09-24 - 2021-12-23 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-21 - 2022-09-20 |
a year | crt.sh |
jsonip.com R3 |
2021-07-26 - 2021-10-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jukstion.duckdns.org/P/off365/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e9a73292135c213ea6935ed1570a333f0968c7a757df208dfedff14000787
Frame ID: 22B273DFE5471B2AA4F3E9D331459DD7
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Sign inPage URL History Show full URLs
-
https://dev-bsawp.pantheonsite.io/P
HTTP 301
https://dev-bsawp.pantheonsite.io/P/ HTTP 302
https://jukstion.duckdns.org/P/off365/ofc/ HTTP 303
https://jukstion.duckdns.org/P/off365/ofc/r.php?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e... Page URL
- https://jukstion.duckdns.org/P/off365/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e9a7... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://dev-bsawp.pantheonsite.io/P
HTTP 301
https://dev-bsawp.pantheonsite.io/P/ HTTP 302
https://jukstion.duckdns.org/P/off365/ofc/ HTTP 303
https://jukstion.duckdns.org/P/off365/ofc/r.php?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e9a73292135c213ea6935ed1570a333f0968c7a757df208dfedff14000787 Page URL
- https://jukstion.duckdns.org/P/off365/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e9a73292135c213ea6935ed1570a333f0968c7a757df208dfedff14000787 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://dev-bsawp.pantheonsite.io/P HTTP 301
- https://dev-bsawp.pantheonsite.io/P/ HTTP 302
- https://jukstion.duckdns.org/P/off365/ofc/ HTTP 303
- https://jukstion.duckdns.org/P/off365/ofc/r.php?signin=d41d8cd98f00b204e9800998ecf8427e&auth=5026c927566e9a73292135c213ea6935ed1570a333f0968c7a757df208dfedff14000787
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
r.php
jukstion.duckdns.org/P/off365/ofc/ Redirect Chain
|
222 B 538 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
jukstion.duckdns.org/P/off365/ofc/s/ |
542 KB 543 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/ |
257 KB 64 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
383 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
jsonip.com/ |
148 B 449 B |
Script
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery function| getIPAddress string| x2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jukstion.duckdns.org/P/off365/ofc/s | Name: ip11 Value: 216.131.114.211 |
|
jukstion.duckdns.org/ | Name: PHPSESSID Value: ea4d5a87ff8c165855b5e2f84469f945 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
dev-bsawp.pantheonsite.io
jsonip.com
jukstion.duckdns.org
104.16.18.94
23.185.0.3
45.79.77.20
89.40.216.229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