firebasestorage.googleapis.com
172.217.175.106
Malicious Activity!
Public Scan
Open in
urlscan Pro
Effective URL: https://firebasestorage.googleapis.com/v0/b/nmu4-1197d.appspot.com/o/v12%2Fvmo.html?alt=media&token=8108c17c-86b5-4ce1-979b-18553080ace1 9yr old
Submission: On June 05 via manual from TW — Scanned from TW
Summary
TLS certificate: Issued by WR2 on May 12th 2025. Valid for: 3mo.
This is the only time firebasestorage.googleapis.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
| IP Address | AS Autonomous System | ||
|---|---|---|---|
| 1 | 172.66.0.227 172.66.0.227 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
| 1 | 172.217.175.106 172.217.175.106 | 15169 (GOOGLE) (GOOGLE) | |
| 1 | 151.101.66.137 151.101.66.137 | 54113 (FASTLY) (FASTLY) | |
| 1 | () () | ||
| 1 | 13.107.253.46 13.107.253.46 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
| 6 | 6 |
ASN15169 (GOOGLE, US)
PTR: nrt20s21-in-f10.1e100.net
| firebasestorage.googleapis.com 9yr old |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
| logincdn.msauth.net 7yr old |
| Apex Domain Subdomains |
Transfer | |
|---|---|---|
| 2 |
googleapis.com
firebasestorage.googleapis.com — Cisco Umbrella Rank: 6932 9yr old |
61 KB |
| 1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 4567 7yr old |
7 KB |
| 1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 870 13yr old |
31 KB |
| 1 |
t.co
t.co — Cisco Umbrella Rank: 1123 13yr old |
1 KB |
| 6 | 4 |
| Domain | Requested by | |
|---|---|---|
| 2 | firebasestorage.googleapis.com |
t.co
firebasestorage.googleapis.com |
| 1 | logincdn.msauth.net |
firebasestorage.googleapis.com
|
| 1 | code.jquery.com |
firebasestorage.googleapis.com
|
| 1 | t.co | |
| 6 | 4 |
This site contains no links.
| Subject Issuer | Validity | Valid | |
|---|---|---|---|
| t.co E6 |
2025-05-22 - 2025-08-20 |
3mo | crt.sh |
| upload.video.google.com WR2 |
2025-05-12 - 2025-08-04 |
3mo | crt.sh |
| *.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
1yr | crt.sh |
| identitycdn.msauth.net Microsoft Azure RSA TLS Issuing CA 03 |
2025-05-25 - 2025-11-21 |
6mo | crt.sh |
This page contains 1 frames:
Primary Page:
https://firebasestorage.googleapis.com/v0/b/nmu4-1197d.appspot.com/o/v12%2Fvmo.html?alt=media&token=8108c17c-86b5-4ce1-979b-18553080ace1
Frame ID: 0E88DDEB03A09FDA93E2E93DC6995E5B
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Access FilePage URL History Show full URLs
- https://t.co/tjc90jO3FX Page URL
- https://firebasestorage.googleapis.com/v0/b/nmu4-1197d.appspot.com/o/v12%2Fvmo.html?alt=media&token=8108c17c-86b5-4... Page URL
Detected technologies
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://t.co/tjc90jO3FX Page URL
- https://firebasestorage.googleapis.com/v0/b/nmu4-1197d.appspot.com/o/v12%2Fvmo.html?alt=media&token=8108c17c-86b5-4ce1-979b-18553080ace1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
| Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
GET H2 |
tjc90jO3FX
t.co/ |
575 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H2 |
Primary Request
v12%2Fvmo.html
firebasestorage.googleapis.com/v0/b/nmu4-1197d.appspot.com/o/ |
61 KB 61 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET BLOB |
ebff948c-1413-4a11-b4a0-868b227b7035
https://firebasestorage.googleapis.com/ |
45 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET |
favicon.ico
firebasestorage.googleapis.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET DATA |
truncated
/ |
14 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H2 |
fluent_web_light_57fee22710b04cebe1d5.svg
logincdn.msauth.net/shared/5/images/ |
43 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- firebasestorage.googleapis.com
- URL
- https://firebasestorage.googleapis.com/favicon.ico
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Window variables
These are the non-standard variables defined on the window object. These include var declarations and global functions and can be helpful in identifying possible client-side frameworks and code.
3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
| Domain/Path | Expires | Name / Value |
|---|---|---|
| .t.co/ | Name: muc Value: 88cc9b5b-1cc3-41bb-9a82-5dcdcacbbaa5 |
|
| .t.co/ | Name: muc_ads Value: 88cc9b5b-1cc3-41bb-9a82-5dcdcacbbaa5 |
|
| .t.co/ | Name: __cf_bm Value: a3jexrz9px9p36_kfOwQwfApH89_9_tluPyUT7A3kuQ-1749105351-1.0.1.1-7i0YAzbE_q1JZJCMo7N11i.v6ltQyc5GT9aozMzBai1oHNLd2dlqkDDzPdvRzSkdAfBxhlezHaDfr0talsxNerIQQ0qoIwuMiro5g3IUkT0 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
| Header | Value |
|---|---|
| Strict-Transport-Security | max-age=0 |
| X-Xss-Protection | 0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
firebasestorage.googleapis.com
logincdn.msauth.net
t.co
firebasestorage.googleapis.com
13.107.253.46
151.101.66.137
172.217.175.106
172.66.0.227
1f00893eec198319f305604ab76d93626cd0e7f9805e3c9d7906a8e864a23ffa
7491e8d9b9eded0f521c9bce6ccae7cb176cae9405c2122408eca87da4cf0768
bbbb8cddf9e6e69b12e540c5e85692c981e09ee094c48ea8e7ce60f616c2ce14
e122dfeee73db9cb846feea1467b85edb1ae624556c643a9c9cc41056508901b
f26ef684e66d404a5e029d8a9e54c66588805b7c71b285afd7700d6dd5c3e39a
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e
