firebasestorage.googleapis.com
Open in
urlscan Pro
2a00:1450:4001:809::200a
Malicious Activity!
Public Scan
Effective URL: https://firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/kkkkmmmmmnnww.html?alt=media&token=c03dc2c9-80f1-4bdd-9784-0c7b...
Submission: On June 23 via manual from FR — Scanned from FR
Summary
TLS certificate: Issued by WE2 on June 2nd 2025. Valid for: 3 months.
This is the only time firebasestorage.googleapis.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ZimbraDomain & IP information
| IP Address | AS Autonomous System | ||
|---|---|---|---|
| 1 1 | 2606:4700:10:... 2606:4700:10::6816:1e8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
| 3 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE) | |
| 1 | 172.217.16.202 172.217.16.202 | 15169 (GOOGLE) (GOOGLE) | |
| 4 | 2 |
ASN15169 (GOOGLE, US)
| firebasestorage.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: fra16s08-in-f10.1e100.net
| firebasestorage.googleapis.com |
| Apex Domain Subdomains |
Transfer | |
|---|---|---|
| 4 |
googleapis.com
firebasestorage.googleapis.com — Cisco Umbrella Rank: 6531 |
422 KB |
| 1 |
cutt.ly
1 redirects
cutt.ly — Cisco Umbrella Rank: 26102 |
484 B |
| 4 | 2 |
| Domain | Requested by | |
|---|---|---|
| 4 | firebasestorage.googleapis.com |
firebasestorage.googleapis.com
|
| 1 | cutt.ly | 1 redirects |
| 4 | 2 |
This site contains no links.
| Subject Issuer | Validity | Valid | |
|---|---|---|---|
| upload.video.google.com WE2 |
2025-06-02 - 2025-08-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/kkkkmmmmmnnww.html?alt=media&token=c03dc2c9-80f1-4bdd-9784-0c7b96266a33
Frame ID: E22D96162FE0FC4974643D11C388A8B3
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
HELLOPage URL History Show full URLs
-
https://cutt.ly/hrEsdYAG
HTTP 301
https://firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/kkkkmmmmmnnww.html?alt=media&token=c03dc2c9... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cutt.ly/hrEsdYAG
HTTP 301
https://firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/kkkkmmmmmnnww.html?alt=media&token=c03dc2c9-80f1-4bdd-9784-0c7b96266a33 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
| Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
GET H2 |
Primary Request
kkkkmmmmmnnww.html
firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/ Redirect Chain
|
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H2 |
zmbk.PNG
firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/ |
402 KB 403 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H2 |
lginzm.PNG
firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H3 |
new-icn.PNG
firebasestorage.googleapis.com/v0/b/qqqwwettrreer.appspot.com/o/ |
844 B 872 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Zimbra0 JavaScript Window variables
These are the non-standard variables defined on the window object. These include var declarations and global functions and can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
| Domain/Path | Expires | Name / Value |
|---|---|---|
| cutt.ly/ | Name: PHPSESSID Value: s4vlgi2qegt7qu8n3cn38cd2m4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cutt.ly
firebasestorage.googleapis.com
172.217.16.202
2606:4700:10::6816:1e8
2a00:1450:4001:809::200a
0d3bd496ff9163bee2bd1bbe2fecf48a5a6b41115576e26b1cee5250fcd55ea8
15bae5cbeb3fdcf6ca92e0f18b1e910ed3f8418371af0c8ad7eb1d132662d9f3
30d1402f7f98a1f4c5a70874aef3a282525bbe2647511c7c417111d72ab8b04a
37f6b0051afdf79fdac1b0885f6a06517b0b67acbf10c86b13c9c631203622f6
