app-discord-academy.com
Open in
urlscan Pro
2606:4700:3037::ac43:a3d9
Malicious Activity!
Public Scan
Submission Tags: sinking-yachts phishing Search All
Submission: On February 22 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by E1 on February 22nd 2022. Valid for: 3 months.
This is the only time app-discord-academy.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Discord (Instant Messenger)Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 2606:4700:303... 2606:4700:3037::ac43:a3d9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
app-discord-academy.com
app-discord-academy.com |
299 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 197 |
28 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 35 |
1 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | app-discord-academy.com |
app-discord-academy.com
|
1 | cdnjs.cloudflare.com |
app-discord-academy.com
|
1 | fonts.googleapis.com |
app-discord-academy.com
|
12 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
discord.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.app-discord-academy.com E1 |
2022-02-22 - 2022-05-23 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-21 - 2022-09-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://app-discord-academy.com/
Frame ID: 553A270C0237B0D492093806C7003B05
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
DiscordDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Forgot your password?
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
app-discord-academy.com/ |
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
app-discord-academy.com/src/css/ |
2 MB 273 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
8 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
62139f1cff10402837062.js
app-discord-academy.com/src/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
antif12.js
app-discord-academy.com/src/js/ |
1 KB 700 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/ |
85 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
44e0c1fbcf99c4476083442e4a2774e0.svg
app-discord-academy.com/src/img/ |
46 KB 16 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
qrcode.png
app-discord-academy.com/src/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
092b071c3b3141a58787415450c27857.png
app-discord-academy.com/src/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
e8acd7d9bf6207f99350ca9f9e23b168.woff
app-discord-academy.com/assets/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
be0060dafb7a0e31d2a1ca17c0708636.woff
app-discord-academy.com/assets/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
3bdef1251a424500c1b3a78dea9b7e57.woff
app-discord-academy.com/assets/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
February 22nd 2022, 7:11:22 pm
UTC —
From United States
Threats:
Phishing
Comment: This domain is present in the Sinking Yachts anti-phishing list. More Info: https://sinking.yachts
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Discord (Instant Messenger)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| $ function| jQuery function| checkpole function| ohmygod function| badgod1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
app-discord-academy.com/ | Name: PHPSESSID Value: 8f3iau2gasfujtv2ellnqfh2fq |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app-discord-academy.com
cdnjs.cloudflare.com
fonts.googleapis.com
2606:4700:3037::ac43:a3d9
2606:4700::6810:135e
2a00:1450:4001:82f::200a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