appstoreerststsd-supporrsesesra.duckdns.org
Open in
urlscan Pro
162.240.103.71
Malicious Activity!
Public Scan
Effective URL: https://appstoreerststsd-supporrsesesra.duckdns.org/account/?view=login&appIdKey=1fd134bb822dcb27367b7f531701feb4290&status=1fd134bb822dcb27367b7f53...
Submission: On June 12 via manual from IE — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time appstoreerststsd-supporrsesesra.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 162.240.103.71 162.240.103.71 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
17 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-240-103-71.unifiedlayer.com
appstoreerststsd-supporrsesesra.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
duckdns.org
appstoreerststsd-supporrsesesra.duckdns.org |
2 MB |
17 | 1 |
Domain | Requested by | |
---|---|---|
17 | appstoreerststsd-supporrsesesra.duckdns.org |
appstoreerststsd-supporrsesesra.duckdns.org
|
17 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
appstoreerststsd-supporrsesesra.duckdns.org R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://appstoreerststsd-supporrsesesra.duckdns.org/account/?view=login&appIdKey=1fd134bb822dcb27367b7f531701feb4290&status=1fd134bb822dcb27367b7f531701feb4290&country=DE
Frame ID: 2ADA59494D3EB293342DC4F0FFCC65FC
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Deine Apple-ID verwalten - Apple (DE)Page URL History Show full URLs
- https://appstoreerststsd-supporrsesesra.duckdns.org/?notic33niny_ Page URL
- https://appstoreerststsd-supporrsesesra.duckdns.org/account/?view=login&appIdKey=1fd134bb822dcb27367b7f531701feb4290&status=1fd1... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://appstoreerststsd-supporrsesesra.duckdns.org/?notic33niny_ Page URL
- https://appstoreerststsd-supporrsesesra.duckdns.org/account/?view=login&appIdKey=1fd134bb822dcb27367b7f531701feb4290&status=1fd134bb822dcb27367b7f531701feb4290&country=DE Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
appstoreerststsd-supporrsesesra.duckdns.org/ |
229 B 677 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
appstoreerststsd-supporrsesesra.duckdns.org/account/ |
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modal.css
appstoreerststsd-supporrsesesra.duckdns.org/assets/css/ |
17 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
appstoreerststsd-supporrsesesra.duckdns.org/assets/css/ |
107 KB 107 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
appstoreerststsd-supporrsesesra.duckdns.org/assets/js/ |
84 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
appstoreerststsd-supporrsesesra.duckdns.org/assets/js/ |
23 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style-login-desktop.css
appstoreerststsd-supporrsesesra.duckdns.org/assets/css/ |
8 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script-login-desktop.js
appstoreerststsd-supporrsesesra.duckdns.org/assets/js/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-desktop.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
1 MB 1 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
navbar-repeat-login.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
186 B 493 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fot-de.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
64 KB 64 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
navbar.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
711 B 1018 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer-login-desktop-de.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
70 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footerbawah-de.png
appstoreerststsd-supporrsesesra.duckdns.org/assets/img/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
31642.ttf
appstoreerststsd-supporrsesesra.duckdns.org/assets/css/ |
91 KB 92 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| $ function| jQuery function| xForm function| login_BTN function| OxForm function| ChangePlaceholder function| Bukapass function| ChangeBack function| Activate function| loading1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
appstoreerststsd-supporrsesesra.duckdns.org/ | Name: PHPSESSID Value: 6f1f367714b4c1d37526a017cad65992 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
appstoreerststsd-supporrsesesra.duckdns.org
162.240.103.71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