vweds.usa.cc
Open in
urlscan Pro
94.177.255.40
Malicious Activity!
Public Scan
Submission: On May 30 via automatic, source phishtank
Summary
This is the only time vweds.usa.cc was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 94.177.255.40 94.177.255.40 | 199883 (ARUBACLOU...) (ARUBACLOUDLTD-ASN) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
11 | 2 |
ASN199883 (ARUBACLOUDLTD-ASN, GB)
PTR: host40-255-177-94.static.arubacloud.com
vweds.usa.cc |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
usa.cc
vweds.usa.cc |
1 MB |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | vweds.usa.cc |
vweds.usa.cc
|
1 | www.sitepoint.com |
vweds.usa.cc
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://vweds.usa.cc/cmi/office365auto%20(1)/login.php?cmd=login_submit&id=39f90aff795d10be0bee05c96afe604b39f90aff795d10be0bee05c96afe604b&session=39f90aff795d10be0bee05c96afe604b39f90aff795d10be0bee05c96afe604b
Frame ID: D4AA2F2A02DB15A1551EC0ED60A5F8B7
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
vweds.usa.cc/cmi/office365auto%20(1)/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f2.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
268 KB 268 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f3.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
420 KB 420 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f4.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
370 KB 370 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f1.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
131 KB 132 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f8.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f5.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
733 B 974 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f6.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f7.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
909 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.png
vweds.usa.cc/cmi/office365auto%20(1)/images/ |
460 B 701 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Office 365 (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
vweds.usa.cc
www.sitepoint.com
54.148.84.95
94.177.255.40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