visa.secure-online.net
Open in
urlscan Pro
63.34.231.60
Malicious Activity!
Public Scan
Submission: On April 04 via api from GB — Scanned from GB
Summary
TLS certificate: Issued by R3 on March 13th 2024. Valid for: 3 months.
This is the only time visa.secure-online.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 63.34.231.60 63.34.231.60 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:e6:... 2606:4700:e6::ac40:cf26 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a02:6ea0:c70... 2a02:6ea0:c700::19 | 60068 (CDN77 _) (CDN77 _) | |
13 | 4 |
ASN16509 (AMAZON-02, US)
PTR: ec2-63-34-231-60.eu-west-1.compute.amazonaws.com
visa.secure-online.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
secure-online.net
visa.secure-online.net |
14 KB |
3 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 237 |
65 KB |
2 |
icons8.com
maxcdn.icons8.com — Cisco Umbrella Rank: 96945 |
51 KB |
2 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1203 |
26 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
6 | visa.secure-online.net |
visa.secure-online.net
|
3 | cdnjs.cloudflare.com |
visa.secure-online.net
|
2 | maxcdn.icons8.com |
visa.secure-online.net
maxcdn.icons8.com |
2 | use.fontawesome.com |
visa.secure-online.net
use.fontawesome.com |
13 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
signup.live.com |
support.microsoft.com |
account.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.secure-online.net R3 |
2024-03-13 - 2024-06-11 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
use.fontawesome.com Cloudflare Inc ECC CA-3 |
2023-10-12 - 2024-10-10 |
a year | crt.sh |
1220595937.rsc.cdn77.org R3 |
2024-03-06 - 2024-06-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://visa.secure-online.net/220
Frame ID: 055BA594BA131FEC8D263F0171F4C9B4
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Sign in to your Microsoft accountDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Create One!
Search URL Search Domain Scan URL
Title: Sign in with a security key
Search URL Search Domain Scan URL
Title: Sign-in options
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
220
visa.secure-online.net/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.5.0/css/ |
157 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.12.0/css/ |
56 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
line-awesome.min.css
maxcdn.icons8.com/fonts/line-awesome/1.1/css/ |
27 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.min.css
visa.secure-online.net/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
visa.secure-online.net/img/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.5.1/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.bundle.min.js
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.5.0/js/ |
79 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.min.js
visa.secure-online.net/js/ |
3 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.png
visa.secure-online.net/assets/img/ |
0 22 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
use.fontawesome.com/releases/v5.12.0/webfonts/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
line-awesome.woff2
maxcdn.icons8.com/fonts/line-awesome/1.1/fonts/ |
44 KB 45 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon32.svg
visa.secure-online.net/img/ |
969 B 1 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap function| validateEmail function| validate function| validatePassword function| submitData object| input1 object| input20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
maxcdn.icons8.com
use.fontawesome.com
visa.secure-online.net
2606:4700::6811:180e
2606:4700:e6::ac40:cf26
2a02:6ea0:c700::19
63.34.231.60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