www.microsoftdoc.com
Open in
urlscan Pro
172.252.38.108
Malicious Activity!
Public Scan
Effective URL: http://www.microsoftdoc.com/
Submission: On December 15 via manual from GB
Summary
This is the only time www.microsoftdoc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bet365 (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 172.252.38.108 172.252.38.108 | 18779 (EGIHOSTING) (EGIHOSTING - EGIHosting) | |
1 | 128.14.7.164 128.14.7.164 | 21859 (ZNET) (ZNET - Zenlayer Inc) | |
2 | 103.235.46.191 103.235.46.191 | 55967 (CNNIC-BAI...) (CNNIC-BAIDU-AP Beijing Baidu Netcom Science and Technology Co.) | |
10 | 4 |
ASN18779 (EGIHOSTING - EGIHosting, US)
microsoftdoc.com | |
www.microsoftdoc.com |
ASN55967 (CNNIC-BAIDU-AP Beijing Baidu Netcom Science and Technology Co., Ltd., CN)
hm.baidu.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
microsoftdoc.com
1 redirects
microsoftdoc.com www.microsoftdoc.com |
31 KB |
2 |
baidu.com
push.zhanzhang.baidu.com Failed hm.baidu.com |
14 KB |
1 |
bc12345678.com
www.bc12345678.com |
|
0 |
51yes.com
Failed
count2.51yes.com Failed |
|
10 | 4 |
Domain | Requested by | |
---|---|---|
5 | www.microsoftdoc.com |
www.microsoftdoc.com
|
2 | hm.baidu.com |
www.microsoftdoc.com
|
1 | www.bc12345678.com |
www.microsoftdoc.com
|
1 | microsoftdoc.com | 1 redirects |
0 | count2.51yes.com Failed |
www.microsoftdoc.com
|
0 | push.zhanzhang.baidu.com Failed |
www.microsoftdoc.com
|
10 | 6 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bc12345678.com TrustAsia TLS RSA CA |
2019-08-15 - 2020-08-14 |
a year | crt.sh |
baidu.com GlobalSign Organization Validation CA - SHA256 - G2 |
2019-10-24 - 2020-06-25 |
8 months | crt.sh |
This page contains 2 frames:
Primary Page:
http://www.microsoftdoc.com/
Frame ID: E7DC29724378EDE713E07DAFE09C49CD
Requests: 9 HTTP requests in this frame
Frame:
https://www.bc12345678.com/
Frame ID: C68D246BF9D6133C278D4885D4E3CAA8
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://microsoftdoc.com/
HTTP 301
http://www.microsoftdoc.com/ Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
22 Outgoing links
These are links going to different origins than the main page.
Title: 赛车赌钱游戏是什么
Search URL Search Domain Scan URL
Title: 游戏 威尼斯人
Search URL Search Domain Scan URL
Title: 威尼斯人官网网址
Search URL Search Domain Scan URL
Title: 威尼斯人平台 phpwind
Search URL Search Domain Scan URL
Title: 威尼斯人酒店旅游概况
Search URL Search Domain Scan URL
Title: 威尼斯人酒店老板
Search URL Search Domain Scan URL
Title: 威尼斯人手机版app
Search URL Search Domain Scan URL
Title: 威尼斯v2828v官方网站
Search URL Search Domain Scan URL
Title: 威尼斯人棋牌真假
Search URL Search Domain Scan URL
Title: 威尼斯城官方网站
Search URL Search Domain Scan URL
Title: 威尼斯人379
Search URL Search Domain Scan URL
Title: 2019威尼斯人棋牌下载
Search URL Search Domain Scan URL
Title: 威尼斯彩票官方网站
Search URL Search Domain Scan URL
Title: 所有威尼斯人平台位置
Search URL Search Domain Scan URL
Title: 美国威尼斯人酒店房价
Search URL Search Domain Scan URL
Title: 澳门之二-威尼斯人酒店
Search URL Search Domain Scan URL
Title: 威尼斯人彩票手机版
Search URL Search Domain Scan URL
Title: 威尼斯平台会黑钱吗
Search URL Search Domain Scan URL
Title: 威尼斯人棋牌游戏作弊器下载
Search URL Search Domain Scan URL
Title: 威尼斯网站哪个好
Search URL Search Domain Scan URL
Title: 威尼斯网站注册
Search URL Search Domain Scan URL
Title: 威尼斯人酒店 澳门
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://microsoftdoc.com/
HTTP 301
http://www.microsoftdoc.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.microsoftdoc.com/ Redirect Chain
|
71 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
www.microsoftdoc.com/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2019.js
www.microsoftdoc.com/ |
1 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
push.js
push.zhanzhang.baidu.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
head_pic.gif
www.microsoftdoc.com/images/ |
9 KB 9 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
homej_conbg3.gif
www.microsoftdoc.com/images/ |
23 B 23 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.bc12345678.com/ Frame C68D |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hm.js
hm.baidu.com/ |
37 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
click.aspx
count2.51yes.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hm.gif
hm.baidu.com/ |
43 B 299 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- push.zhanzhang.baidu.com
- URL
- http://push.zhanzhang.baidu.com/push.js
- Domain
- count2.51yes.com
- URL
- http://count2.51yes.com/click.aspx?id=28075928&logo=12
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bet365 (Entertainment)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| ss object| _hmt boolean| _bdhm_loaded_2523ecdc7a32940cff861c30f87bf50b object| mini_tangram_log_gadf230 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
count2.51yes.com
hm.baidu.com
microsoftdoc.com
push.zhanzhang.baidu.com
www.bc12345678.com
www.microsoftdoc.com
count2.51yes.com
push.zhanzhang.baidu.com
103.235.46.191
128.14.7.164
172.252.38.108
52658b6b1d866b1a305f8783dd717215bc378bbf188e827de181508a5b4faad5
7cdf1a2e9e5d3e2a61e54dbf8853006c3238e88e44061888bc5839553acc6b8a
9347be060613cd3bf5a2774b24be15af8fe2afef7d0e0ebaa4feafe745082dff
b7fe8ce8b08b86c8919617e4744584511adc51900c7d9049393ce48d1299a121
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
dbdcff07fa99b32853862ffeb211e8c419d97baa7cb0c2a71b7e15f3bbb20e40
e94762cd643087f3396b71b8c35bc3b43fc21f7452c81532306a7624a11493e9