danielmunoz.design
Open in
urlscan Pro
178.18.244.41
Malicious Activity!
Public Scan
Submission: On June 17 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 17th 2022. Valid for: 3 months.
This is the only time danielmunoz.design was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 178.18.244.41 178.18.244.41 | 51167 (CONTABO) (CONTABO) | |
1 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
3 | 2 |
ASN51167 (CONTABO, DE)
PTR: vmi911311.contaboserver.net
danielmunoz.design |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
danielmunoz.design
danielmunoz.design |
387 KB |
1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 2470 |
2 KB |
3 | 2 |
Domain | Requested by | |
---|---|---|
2 | danielmunoz.design |
danielmunoz.design
|
1 | logincdn.msauth.net |
danielmunoz.design
|
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpcontacts.danielmunoz.design R3 |
2022-06-17 - 2022-09-15 |
3 months | crt.sh |
identitycdn.msauth.net Microsoft Azure TLS Issuing CA 02 |
2022-05-13 - 2023-05-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://danielmunoz.design/CD/office/
Frame ID: 8D76B0AB5B5710D9888F0A3E2C7DC0F7
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
danielmunoz.design/CD/office/ |
130 KB 130 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b.jpg
danielmunoz.design/CD/office/ |
257 KB 258 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
danielmunoz.design
logincdn.msauth.net
178.18.244.41
192.229.221.185
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
c3cba648d000b2c3f849411b012a3c983b2695d5999ad246db48eeee34473f1b
db796b3319c42530dad20050147f885efb997c80b4ee92881ae6285e426c4b0d