admin-office365.dns.army Open in urlscan Pro
185.207.31.57  Malicious Activity! Public Scan

URL: http://admin-office365.dns.army/subscription/admin/
Submission: On May 17 via manual from DE

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 5 HTTP transactions. The main IP is 185.207.31.57, located in Saudi Arabia and belongs to SADEEMCLOUD, SA. The main domain is admin-office365.dns.army.
This is the only time admin-office365.dns.army was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 3 185.207.31.57 209197 (SADEEMCLOUD)
1 2a00:1450:400... 15169 (GOOGLE)
2 4 2606:4700:303... 13335 (CLOUDFLAR...)
5 3
Apex Domain
Subdomains
Transfer
4 zupimages.net
zupimages.net
www.zupimages.net
279 KB
3 dns.army
admin-office365.dns.army
104 KB
1 googleapis.com
ajax.googleapis.com
30 KB
5 3
Domain Requested by
3 admin-office365.dns.army 1 redirects admin-office365.dns.army
2 www.zupimages.net admin-office365.dns.army
2 zupimages.net 2 redirects
1 ajax.googleapis.com admin-office365.dns.army
5 4

This site contains no links.

Subject Issuer Validity Valid
upload.video.google.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2019-12-10 -
2020-10-09
10 months crt.sh

This page contains 1 frames:

Primary Page: http://admin-office365.dns.army/subscription/admin/
Frame ID: 3B41BF1175C6565A1386DAAD8E716752
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://admin-office365.dns.army/subscription/admin HTTP 301
    http://admin-office365.dns.army/subscription/admin/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

60 %
HTTPS

67 %
IPv6

3
Domains

4
Subdomains

3
IPs

3
Countries

412 kB
Transfer

466 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://admin-office365.dns.army/subscription/admin HTTP 301
    http://admin-office365.dns.army/subscription/admin/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://zupimages.net/up/18/52/1lxd.jpg HTTP 301
  • https://www.zupimages.net/up/18/52/1lxd.jpg
Request Chain 3
  • https://zupimages.net/up/18/52/04a6.jpg HTTP 301
  • https://www.zupimages.net/up/18/52/04a6.jpg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
admin-office365.dns.army/subscription/admin/
Redirect Chain
  • http://admin-office365.dns.army/subscription/admin
  • http://admin-office365.dns.army/subscription/admin/
100 KB
100 KB
Document
General
Full URL
http://admin-office365.dns.army/subscription/admin/
Protocol
HTTP/1.1
Server
185.207.31.57 , Saudi Arabia, ASN209197 (SADEEMCLOUD, SA),
Reverse DNS
fada.conectx05.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash
a9f9b97b2d65fc8a11e20f63e489856564369ec15b8e711ebf36106637268083

Request headers

Host
admin-office365.dns.army
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 16 May 2020 18:40:13 GMT
Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Sat, 16 May 2020 18:40:12 GMT
Server
Apache/2.2.15 (CentOS)
Location
http://admin-office365.dns.army/subscription/admin/
Content-Length
349
Connection
close
Content-Type
text/html; charset=iso-8859-1
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/
85 KB
30 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js
Requested by
Host: admin-office365.dns.army
URL: http://admin-office365.dns.army/subscription/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
http://admin-office365.dns.army/subscription/admin/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 06 May 2020 04:26:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
940440
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30399
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 19:15:00 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 06 May 2021 04:26:14 GMT
log.svg
admin-office365.dns.army/subscription/admin/
4 KB
4 KB
Image
General
Full URL
http://admin-office365.dns.army/subscription/admin/log.svg
Requested by
Host: admin-office365.dns.army
URL: http://admin-office365.dns.army/subscription/admin/
Protocol
HTTP/1.1
Server
185.207.31.57 , Saudi Arabia, ASN209197 (SADEEMCLOUD, SA),
Reverse DNS
fada.conectx05.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Referer
http://admin-office365.dns.army/subscription/admin/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 16 May 2020 18:40:13 GMT
Last-Modified
Thu, 02 May 2019 17:15:20 GMT
Server
Apache/2.2.15 (CentOS)
ETag
"1f68a-e43-587eac756ba00"
Content-Type
image/svg+xml
Connection
close
Accept-Ranges
bytes
Content-Length
3651
1lxd.jpg
www.zupimages.net/up/18/52/
Redirect Chain
  • https://zupimages.net/up/18/52/1lxd.jpg
  • https://www.zupimages.net/up/18/52/1lxd.jpg
944 B
1 KB
Image
General
Full URL
https://www.zupimages.net/up/18/52/1lxd.jpg
Requested by
Host: admin-office365.dns.army
URL: http://admin-office365.dns.army/subscription/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681c:d75 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ac72a76be7afcfffccd6344d5814b7b59637e3257232ed3b70feb21ed38536d3

Request headers

Referer
http://admin-office365.dns.army/subscription/admin/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 17 May 2020 01:40:15 GMT
cf-cache-status
HIT
cf-bgj
csam-hash
server
cloudflare
age
1215
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=432000
content-disposition
filename="1lxd.jpg"
cf-ray
5949a11b5bbb178a-FRA
cf-request-id
02c1e3051b0000178ae11d4200000001

Redirect headers

date
Sun, 17 May 2020 01:40:14 GMT
cf-cache-status
EXPIRED
server
cloudflare
status
301
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
location
https://www.zupimages.net/up/18/52/1lxd.jpg
cache-control
max-age=432000
cf-ray
5949a118ffa5178a-FRA
cf-request-id
02c1e3039c0000178ae11b1200000001
04a6.jpg
www.zupimages.net/up/18/52/
Redirect Chain
  • https://zupimages.net/up/18/52/04a6.jpg
  • https://www.zupimages.net/up/18/52/04a6.jpg
277 KB
277 KB
Image
General
Full URL
https://www.zupimages.net/up/18/52/04a6.jpg
Requested by
Host: admin-office365.dns.army
URL: http://admin-office365.dns.army/subscription/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681c:d75 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb

Request headers

Referer
http://admin-office365.dns.army/subscription/admin/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 17 May 2020 01:40:15 GMT
cf-cache-status
HIT
cf-bgj
csam-hash
server
cloudflare
age
1215
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=432000
content-disposition
filename="04a6.jpg"
cf-ray
5949a11b5bba178a-FRA
cf-request-id
02c1e3051b0000178ae11d3200000001

Redirect headers

date
Sun, 17 May 2020 01:40:14 GMT
cf-cache-status
EXPIRED
server
cloudflare
status
301
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html
location
https://www.zupimages.net/up/18/52/04a6.jpg
cache-control
max-age=432000
cf-ray
5949a118ffa7178a-FRA
cf-request-id
02c1e3039c0000178ae11b2200000001

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| isValidEmailAddress

0 Cookies