puukotad.com
Open in
urlscan Pro
207.246.122.209
Malicious Activity!
Public Scan
Submission: On August 21 via api from US — Scanned from CA
Summary
TLS certificate: Issued by R11 on August 5th 2024. Valid for: 3 months.
This is the only time puukotad.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
25 | 207.246.122.209 207.246.122.209 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 15.204.213.5 15.204.213.5 | 16276 (OVH) (OVH) | |
2 | 2a03:2880:f01... 2a03:2880:f012:10c:face:b00c:0:3 | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 2600:141b:1c0... 2600:141b:1c00:248b::f03 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 2a03:2880:f11... 2a03:2880:f112:182:face:b00c:0:25de | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 172.67.208.186 172.67.208.186 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
32 | 7 |
ASN20473 (AS-CHOOPA, US)
PTR: 207.246.122.209.vultrusercontent.com
puukotad.com |
ASN32934 (FACEBOOK, US)
connect.facebook.net |
ASN20940 (AKAMAI-ASN1, NL)
support.microsoft.com |
ASN32934 (FACEBOOK, US)
www.facebook.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
25 |
puukotad.com
puukotad.com |
1018 KB |
2 |
facebook.com
www.facebook.com — Cisco Umbrella Rank: 108 |
3 KB |
2 |
facebook.net
connect.facebook.net — Cisco Umbrella Rank: 236 |
74 KB |
1 |
userstatics.com
userstatics.com — Cisco Umbrella Rank: 303208 |
675 B |
1 |
microsoft.com
support.microsoft.com — Cisco Umbrella Rank: 12550 |
|
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 72804 |
1018 B |
32 | 6 |
Domain | Requested by | |
---|---|---|
25 | puukotad.com |
puukotad.com
|
2 | www.facebook.com |
puukotad.com
|
2 | connect.facebook.net |
puukotad.com
connect.facebook.net |
1 | userstatics.com |
puukotad.com
|
1 | support.microsoft.com |
puukotad.com
|
1 | ipwho.is |
puukotad.com
|
32 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
puukotad.com R11 |
2024-08-05 - 2024-11-03 |
3 months | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2024-03-13 - 2025-03-13 |
a year | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2024-05-30 - 2024-08-28 |
3 months | crt.sh |
support.microsoft.com Microsoft Azure ECC TLS Issuing CA 04 |
2024-05-01 - 2025-04-26 |
a year | crt.sh |
userstatics.com WE1 |
2024-07-24 - 2024-10-22 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://puukotad.com/4255j/
Frame ID: 5B83701570D7A032BFF0BF130C1C919D
Requests: 32 HTTP requests in this frame
Frame:
https://support.microsoft.com/en-us/windows
Frame ID: 4581F0994404A653A2CD851E8BAB9504
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Security centerDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Facebook (Widgets) Expand
Detected patterns
- //connect\.facebook\.([a-z]+)/[^/]*/[a-z]*\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
32 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
puukotad.com/4255j/ |
33 KB 33 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
puukotad.com/4255j/css/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
puukotad.com/4255j/css/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg1.jpg
puukotad.com/4255j/images/ |
550 B 550 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg2.jpg
puukotad.com/4255j/images/ |
550 B 550 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
minimize.jpg
puukotad.com/4255j/images/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kxFy-clip.png
puukotad.com/4255j/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qsbs-firewall.png
puukotad.com/4255j/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s-S4-acc.png
puukotad.com/4255j/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Z5BR-network.png
puukotad.com/4255j/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uZbx-si.png
puukotad.com/4255j/images/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
-EBq-current.png
puukotad.com/4255j/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nOxp-sett.png
puukotad.com/4255j/images/ |
905 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
puukotad.com/4255j/images/ |
339 B 581 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cross.png
puukotad.com/4255j/images/ |
308 KB 308 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
puukotad.com/4255j/images/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
puukotad.com/4255j/js/ |
202 KB 202 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
puukotad.com/4255j/js/ |
115 KB 115 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
puukotad.com/4255j/js/ |
3 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
puukotad.com/4255j/js/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
746 B 1018 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fbevents.js
connect.facebook.net/en_US/ |
225 KB 60 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
windows
support.microsoft.com/en-us/ Frame 4581 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iicme4.mp3
puukotad.com/4255j/media/ |
196 KB 196 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
speech.mp3
puukotad.com/4255j/media/ |
550 B 837 B |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
637211488626768
connect.facebook.net/signals/config/ |
62 KB 14 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4UabrENHsxJlGDuGo1OIlLU94YtzCwY.woff2
puukotad.com/4255j/fonts/ |
21 KB 21 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.facebook.com/tr/ |
0 274 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.facebook.com/privacy_sandbox/pixel/register/trigger/ |
67 B 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.js
userstatics.com/get/ |
133 B 675 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
puukotad.com/4255j/fonts/ |
65 KB 65 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
puukotad.com/4255j/images/ |
339 B 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| t function| getVariableFromURl function| fbq function| _fbq string| ipadd string| city string| country string| isp string| currtime function| _0x2a7f93 function| _0x4a8d function| _0x36de function| $ function| jQuery function| _0x504c function| _0x55fa object| bootstrap function| _0x595f76 function| _0x1b87 function| _0x281f function| startScan function| _0x9f2a function| _0x3a16 function| playSound18 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
support.microsoft.com/signin-oidc | Name: .AspNetCore.OpenIdConnect.Nonce.CfDJ8LWN6nmb9HBGpcIJvpEgkL3kQkjU2D8MpyjA3mVZWCHw-XFz7pAGUeaBQArVMb0tBWklMnYqEI94rm7nQKWuA_8yjxrn8bvx8B-tr2hHvOhHvjKYxBcnU49jQNhaMeHirVh9jAx7_to_71lcJbxjVQ2AasMevvEbiVS_hW0jxZG_ul65w7g7Rlu1cDJYQMX_64NrPgyb7V2JH04LF9u8udkvb7iiQoQFqiVvlYb7LQ_I4-AtnIFv4CSzkBtbSNdWMtiIkTu7EQe4hRLjqjF5YoE Value: N |
|
puukotad.com/4255j | Name: PHPREFS Value: full |
|
support.microsoft.com/ | Name: EXPID Value: 9007b9fe-5b5d-4b78-8b89-2e16c5eb882a |
|
.puukotad.com/ | Name: _fbp Value: fb.1.1724221995329.627950288144296932 |
|
login.microsoftonline.com/ | Name: buid Value: 0.ASkAMe_N-B6jSkuT5F9XHpElWhkrJ-4RRD9DjyhcE8tv1AcBAAA.AQABGgEAAAApTwJmzXqdR4BN2miheQMYWDg1t5bQQWWAtfGJ67OB8pTVepEjBPfu4BkEU4a_2zGST7Kil5KgLELN1WdvoCxoz4Pdg-sVmemajxZb8vBokZQ4U8kpsCCsVYbuGq0Skw8gAA |
|
.login.microsoftonline.com/ | Name: esctx Value: PAQABBwEAAAApTwJmzXqdR4BN2miheQMYmggaVfq_Y3II3OUuAu3C2JumOzB7oORxC2tWNhcCzJUWV3urrVbfnL01KXTLwLH1Yd7tdHRG2D5ybBLGmyTzz39CbvlmXtGjGFdx6fQKa7WuipunkGEC3qIB4xYcEFyR8PRXZxvM1bweKlPyI6Jhct__2E8pkZkH44xz8EXffIQgAA |
|
.login.microsoftonline.com/ | Name: esctx-gT1plxzzPiI Value: AQABCQEAAAApTwJmzXqdR4BN2miheQMYtPizA0j6qXIwHAsGJwrNsjdsib-Ww61pcQkDH3XZQ6TVYBqVrkHlRvFdjVpHUu3lBzFtngHU4JB8c9ZeppQGqiHwrhgjgZuIJiFpbgsRw5V341QbiF1GNapOc88yrUPE5pmwKfmsjt1kjNLOBuzbqCAA |
|
login.microsoftonline.com/ | Name: fpc Value: AuYAQJgflLhCs_7m-OswBs1qwEtIAQAAACuBV94OAAAA |
|
login.microsoftonline.com/ | Name: x-ms-gateway-slice Value: estsfd |
|
login.microsoftonline.com/ | Name: stsservicecookie Value: estsfd |
|
support.microsoft.com/ | Name: MicrosoftApplicationsTelemetryDeviceId Value: f0dfe1e0-74aa-4887-a723-26e85b5b3b2c |
|
support.microsoft.com/ | Name: ai_session Value: hwrPfDHytnRrl7xWfaXqwS|1724221995573|1724221995573 |
|
.login.live.com/ | Name: uaid Value: b95d76aaa2a9466094212ac45d66d2df |
|
.login.live.com/ | Name: MSPRequ Value: id=12<=1724221996&co=0 |
|
.login.live.com/ | Name: OParams Value: 11O.Dtuh8BStm4B6d5bkfVjFbzNUYt8A1SJePTpmJTLdnVqMk7RvqeCKzqw497PhAHd4jpk7u4Qn7Roh7o96S4KCp8fpGm!7vU0ZmMbvUC4rCmbYmbjAM*lx8qu3HmtsVz*DLwkaxvw8KlJ2E09gaiAPl*Nbo5FD1WxXEeUPoFAMGnXQdLcaDW2gYjJY2pdkK5pyiZDA8Iy0QCnBoFDUqPDY32y9SsLCNMETa2ya4LshjGP0aUaMSl*vuus90tslKOUaVmaL6TQwbJdFfPvujROPRdQ$ |
|
.microsoft.com/ | Name: MC1 Value: GUID=7b85a8c7edb847e180eea9ec7c112cb1&HASH=7b85&LV=202408&V=4&LU=1724221997647 |
|
.microsoft.com/ | Name: MS0 Value: f0c63c4ea4dc4b7f96732abb36103e3b |
|
support.microsoft.com/ | Name: MSFPC Value: GUID=7b85a8c7edb847e180eea9ec7c112cb1&HASH=7b85&LV=202408&V=4&LU=1724221997647 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.facebook.net
ipwho.is
puukotad.com
support.microsoft.com
userstatics.com
www.facebook.com
15.204.213.5
172.67.208.186
207.246.122.209
2600:141b:1c00:248b::f03
2a03:2880:f012:10c:face:b00c:0:3
2a03:2880:f112:182:face:b00c:0:25de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