sangharshyadav.com
Open in
urlscan Pro
31.170.166.108
Malicious Activity!
Public Scan
Effective URL: http://sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/?newsid=7337743...
Submission: On May 16 via manual from CZ
Summary
This is the only time sangharshyadav.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 185.100.86.18 185.100.86.18 | 200651 (FLOKINET) (FLOKINET) | |
5 | 31.170.166.108 31.170.166.108 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:2bf::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
7 | 3 |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
sangharshyadav.com
sangharshyadav.com |
283 KB |
2 |
frontler-fund.com
2 redirects
frontler-fund.com |
928 B |
1 |
jquery.com
code.jquery.com |
33 KB |
1 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
2 KB |
7 | 4 |
Domain | Requested by | |
---|---|---|
5 | sangharshyadav.com |
sangharshyadav.com
|
2 | frontler-fund.com | 2 redirects |
1 | code.jquery.com |
sangharshyadav.com
|
1 | secure.aadcdn.microsoftonline-p.com |
sangharshyadav.com
|
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 1 |
2017-08-15 - 2019-08-15 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/?newsid=7337743139NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&loginpage=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&reff=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=
Frame ID: A067270C5B6EEDADA409717240D1E16B
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://frontler-fund.com/..%40/..%40/?id=RqCKNxFh02&email=
HTTP 302
https://frontler-fund.com/..%40/..%40/cmd-login=f2f29a7f532992289af6a6a98475074f/?newsid=4807529082NWE... HTTP 302
http://sangharshyadav.com//.PWell-known/.well-known/.well-known/?email= Page URL
- http://sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://frontler-fund.com/..%40/..%40/?id=RqCKNxFh02&email=
HTTP 302
https://frontler-fund.com/..%40/..%40/cmd-login=f2f29a7f532992289af6a6a98475074f/?newsid=4807529082NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&loginpage=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&reff=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM= HTTP 302
http://sangharshyadav.com//.PWell-known/.well-known/.well-known/?email= Page URL
- http://sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/?newsid=7337743139NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&loginpage=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&reff=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://frontler-fund.com/..%40/..%40/?id=RqCKNxFh02&email= HTTP 302
- https://frontler-fund.com/..%40/..%40/cmd-login=f2f29a7f532992289af6a6a98475074f/?newsid=4807529082NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&loginpage=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=&reff=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM=NWEyMTBhOGIxNzNmNWJhYjk1M2IxMjk5ZjM3ODRkMmM= HTTP 302
- http://sangharshyadav.com//.PWell-known/.well-known/.well-known/?email=
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
sangharshyadav.com//.PWell-known/.well-known/.well-known/ Redirect Chain
|
630 B 539 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.7651.13/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/ |
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left.svg
sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/ |
513 B 642 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.3.min.js
code.jquery.com/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
sangharshyadav.com//.PWell-known/.well-known/.well-known/cmd-login=a04c342df038178950cbc98e10d0fcfc/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| showhide0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
frontler-fund.com
sangharshyadav.com
secure.aadcdn.microsoftonline-p.com
185.100.86.18
205.185.208.52
2a02:26f0:6c00:2bf::35c1
31.170.166.108
0217074b023f42a060e187a327927e73ca7a8899e01bcb24e5ecc8e9c1d5adc7
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
ecb916133a9376911f10bc5c659952eb0031e457f5df367cde560edbfba38fb8
f708f013922d1be89fc5ff16a167c3c9306734a0814a7b8acfc4009ffea6948b