houstooj.gq
Open in
urlscan Pro
2606:4700:30::6812:29c3
Malicious Activity!
Public Scan
Effective URL: https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/?sslchannel=true&sessionid=TUSrUfE2AjptajZBb...
Submission: On April 16 via api from GB
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on April 15th 2019. Valid for: a year.
This is the only time houstooj.gq was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2606:4700:30:... 2606:4700:30::6812:28c3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 7 | 2606:4700:30:... 2606:4700:30::6812:29c3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 | 2620:1ec:bdf::10 2620:1ec:bdf::10 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
8 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
houstooj.gq |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
houstooj.gq |
ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
aadcdn.msauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
houstooj.gq
4 redirects
houstooj.gq |
8 KB |
3 |
msauth.net
aadcdn.msauth.net |
300 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
9 | houstooj.gq |
4 redirects
houstooj.gq
|
3 | aadcdn.msauth.net |
houstooj.gq
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-04-15 - 2020-04-15 |
a year | crt.sh |
aadcdn.msauth.net Microsoft IT TLS CA 4 |
2018-11-07 - 2020-11-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/?sslchannel=true&sessionid=TUSrUfE2AjptajZBb6bXSnNrdXZcpKtiEmJyCoBcH0GSkGuvNGsF3g7gd7sCRWVwiF5V3G7LHOE2u8yh
Frame ID: 21BE2A1B862CFBDE90D026957CE4E4AF
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://houstooj.gq/
HTTP 301
https://houstooj.gq/ HTTP 302
https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573 HTTP 301
http://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/ HTTP 301
https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/ Page URL
- https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/?sslchannel=true&session... Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://houstooj.gq/
HTTP 301
https://houstooj.gq/ HTTP 302
https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573 HTTP 301
http://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/ HTTP 301
https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/ Page URL
- https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/?sslchannel=true&sessionid=TUSrUfE2AjptajZBb6bXSnNrdXZcpKtiEmJyCoBcH0GSkGuvNGsF3g7gd7sCRWVwiF5V3G7LHOE2u8yh Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://houstooj.gq/ HTTP 301
- https://houstooj.gq/ HTTP 302
- https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573 HTTP 301
- http://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/ HTTP 301
- https://houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/ Redirect Chain
|
204 B 231 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/ |
27 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_ia88a1prlwdqyj0b-dw4zw2.css
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
100 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/srcoff/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
aadcdn.msauth.net/ests/2.1/content/images/backgrounds/ |
3 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
aadcdn.msauth.net/ests/2.1/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/srcoff/ |
915 B 277 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
houstooj.gq/4345a7b9-9a63-4910-a426/customer-IDPP00C573/authnow/srcoff/ |
915 B 280 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
houstooj.gq/ | Name: PHPSESSID Value: 4om8qqppgas859sa7e3uupnmc6 |
|
.houstooj.gq/ | Name: __cfduid Value: dafebb92784c59fba558b5cd85672a07e1555378948 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
houstooj.gq
2606:4700:30::6812:28c3
2606:4700:30::6812:29c3
2620:1ec:bdf::10
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
2a31064f467527576b737a9b386cee3a610b79bfde425649edc16722a2fd99c2
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
d91ab164f7f64967f34c727db7715d1f65bef2c3f10b76b02c7b1a8ba9c2ddec
e0dd7fe1b8c46592a568bd4e50e6c79931c2905a60923adf7f66c2176e7cb69c
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea