shdgs63.z11.web.core.windows.net
Open in
urlscan Pro
20.150.85.193
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On November 07 via api from FI — Scanned from JP
Summary
TLS certificate: Issued by Microsoft Azure RSA TLS Issuing CA 07 on October 29th 2024. Valid for: 6 months.
This is the only time shdgs63.z11.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
21 | 20.150.85.193 20.150.85.193 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a04:4e42:200... 2a04:4e42:200::649 | 54113 (FASTLY) (FASTLY) | |
1 | 195.201.57.90 195.201.57.90 | 24940 (HETZNER-AS) (HETZNER-AS) | |
23 | 4 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
shdgs63.z11.web.core.windows.net |
ASN24940 (HETZNER-AS, DE)
PTR: static.90.57.201.195.clients.your-server.de
ipwho.is |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
windows.net
shdgs63.z11.web.core.windows.net |
616 KB |
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 59835 |
940 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 791 |
27 KB |
23 | 3 |
Domain | Requested by | |
---|---|---|
21 | shdgs63.z11.web.core.windows.net |
shdgs63.z11.web.core.windows.net
|
1 | ipwho.is |
shdgs63.z11.web.core.windows.net
|
1 | code.jquery.com |
shdgs63.z11.web.core.windows.net
|
23 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure RSA TLS Issuing CA 07 |
2024-10-29 - 2025-04-27 |
6 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2024-03-13 - 2025-03-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://shdgs63.z11.web.core.windows.net/werrx01USAHTML/?bcda=00-1-234-294-2156
Frame ID: B8892ED227C71340D6B3D036B2B14378
Requests: 24 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tapa.css
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.4.4.min.js
code.jquery.com/ |
77 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
452 KB 452 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mnc.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
187 B 557 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
168 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
set.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
364 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vsc.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bx1.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
97 KB 97 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bel.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
276 B 646 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pcm.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dm.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
332 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nvidia.js
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jupiter.js
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
503 B 879 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jscode.js
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
1 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
668 B 940 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
349 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Fm7-alert.wav
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
3 MB 0 |
Media
audio/wav |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ai2.mp3
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Fm7-alert.wav
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
5 KB 0 |
Media
audio/wav |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
168 B 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Fm7-alert.wav
shdgs63.z11.web.core.windows.net/werrx01USAHTML/ |
7 KB 0 |
Media
audio/wav |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| t function| wevweewfwefegwwerewewefgew string| bcda function| toggleFullScreen function| addEvent function| getQueryParam string| ipadd string| city string| country string| isp string| currtime0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ipwho.is
shdgs63.z11.web.core.windows.net
195.201.57.90
20.150.85.193
2a04:4e42:200::649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