tuxa21-1torix.pages.dev
Open in
urlscan Pro
188.114.97.3
Malicious Activity!
Public Scan
Submission Tags: @ecarlesi threat phishing meta Search All
Submission: On January 20 via api from IT — Scanned from DE
Summary
TLS certificate: Issued by WE1 on January 20th 2026. Valid for: 3 months.
This is the only time tuxa21-1torix.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
| IP Address | AS Autonomous System | ||
|---|---|---|---|
| 4 | 188.114.97.3 188.114.97.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
| 1 | 172.67.70.233 172.67.70.233 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
| 6 | 3 |
| Apex Domain Subdomains |
Transfer | |
|---|---|---|
| 4 |
pages.dev
tuxa21-1torix.pages.dev |
159 KB |
| 1 |
geojs.io
get.geojs.io — Cisco Umbrella Rank: 18632 |
797 B |
| 0 |
smtpjs.com
Failed
smtpjs.com Failed |
|
| 6 | 3 |
| Domain | Requested by | |
|---|---|---|
| 4 | tuxa21-1torix.pages.dev |
tuxa21-1torix.pages.dev
|
| 1 | get.geojs.io |
tuxa21-1torix.pages.dev
|
| 0 | smtpjs.com Failed |
tuxa21-1torix.pages.dev
|
| 6 | 3 |
This site contains no links.
| Subject Issuer | Validity | Valid | |
|---|---|---|---|
| tuxa21-1torix.pages.dev WE1 |
2026-01-20 - 2026-04-20 |
3 months | crt.sh |
| geojs.io WE1 |
2025-12-20 - 2026-03-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://tuxa21-1torix.pages.dev/
Frame ID: FB13F32FFF2975F6E616995DEA6E9578
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
| Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
GET H3 |
Primary Request
/
tuxa21-1torix.pages.dev/ |
768 B 874 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H3 |
main.6515e135.js
tuxa21-1torix.pages.dev/static/js/ |
374 KB 127 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H3 |
main.98111468.css
tuxa21-1torix.pages.dev/static/css/ |
64 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET |
smtp.js
smtpjs.com/v3/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H3 |
geo.json
get.geojs.io/v1/ip/ |
346 B 797 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
GET H3 |
favicon.ico
tuxa21-1torix.pages.dev/ |
4 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- smtpjs.com
- URL
- https://smtpjs.com/v3/smtp.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)2 JavaScript Window variables
These are the non-standard variables defined on the window object. These include var declarations and global functions and can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkui string| __reactRouterVersion0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
| Source | Level | URL Text |
|---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
| Header | Value |
|---|---|
| X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
get.geojs.io
smtpjs.com
tuxa21-1torix.pages.dev
smtpjs.com
172.67.70.233
188.114.97.3
13aeed2628918b688dd8f1a65cbd5c64ec36c865808b58414eeadf5ceb4349cd
45b0a25cb88153dda85a074c25148c6407aa0bfff80d7de99bf802ba270ffdfb
45c280d878216b131869e1c096b64ad12505140ae8269928fe6cd47654e14a96
75476d4fa93c73823ba9efd9f14068fce0af20f9e2183bc978fb30c2df2c55c7
bcda1710003b7404834946ad8f7829d733406d1cf4ad106295ffb9c8a59a0fa1
