samsp-cha-qg02.web.app
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Submission: On June 12 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by WR4 on May 21st 2024. Valid for: 3 months.
This is the only time samsp-cha-qg02.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 188.114.97.3 188.114.97.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 2620:100:6022... 2620:100:6022:18::a27d:4212 | 19679 (DROPBOX) (DROPBOX) | |
1 | 2620:100:6022... 2620:100:6022:15::a27d:420f | 19679 (DROPBOX) (DROPBOX) | |
2 | 34.87.62.255 34.87.62.255 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
2 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
10 | 6 |
ASN19679 (DROPBOX, US)
ucb98f63ae1231d29c6ca0bf5272.dl.dropboxusercontent.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 255.62.87.34.bc.googleusercontent.com
qg02.s2.wtf |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
web.app
samsp-cha-qg02.web.app |
108 KB |
2 |
s2.wtf
qg02.s2.wtf |
279 B |
1 |
dropboxusercontent.com
ucb98f63ae1231d29c6ca0bf5272.dl.dropboxusercontent.com |
868 KB |
1 |
dropbox.com
1 redirects
www.dropbox.com — Cisco Umbrella Rank: 2911 |
3 KB |
1 |
freeipapi.com
freeipapi.com — Cisco Umbrella Rank: 112948 |
744 B |
10 | 5 |
Domain | Requested by | |
---|---|---|
6 | samsp-cha-qg02.web.app |
samsp-cha-qg02.web.app
|
2 | qg02.s2.wtf |
samsp-cha-qg02.web.app
|
1 | ucb98f63ae1231d29c6ca0bf5272.dl.dropboxusercontent.com |
samsp-cha-qg02.web.app
|
1 | www.dropbox.com | 1 redirects |
1 | freeipapi.com |
samsp-cha-qg02.web.app
|
10 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
web.app WR4 |
2024-05-21 - 2024-08-19 |
3 months | crt.sh |
freeipapi.com Cloudflare Inc ECC CA-3 |
2024-01-21 - 2024-12-31 |
a year | crt.sh |
qg02.s2.wtf E5 |
2024-06-06 - 2024-09-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://samsp-cha-qg02.web.app/
Frame ID: AC3CE088AC9B9CB75BB3017996D3A8CB
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://www.dropbox.com/scl/fi/clgk9v0o9qqvrzssy7vzy/27baHo4dN_O.png?rlkey=n2ukporxk2xgohmzdzjd7yskv&st=47ns94sq&dl=1 HTTP 302
- https://ucb98f63ae1231d29c6ca0bf5272.dl.dropboxusercontent.com/cd/0/get/CUt6hgx8fzHNgwG3DE2L6uATOW8NO-Z29i3aYZuBpDPMO0zl7FozaT_teINB7LpErbqL5RUjd9h8mQnHxq3a33zmmt2l-BV0_Gfqha1K5Kn_qr9xN32NIJXnj4V6c24RjAWm2BE178u6LY1f7rdq74mF/file?dl=1
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
samsp-cha-qg02.web.app/ |
605 B 587 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.9b9f46c3.js
samsp-cha-qg02.web.app/js/ |
298 KB 81 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.9cb46cad.js
samsp-cha-qg02.web.app/js/ |
107 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.fbcb92eb.css
samsp-cha-qg02.web.app/css/ |
36 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
json
freeipapi.com/api/ |
396 B 744 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
file
ucb98f63ae1231d29c6ca0bf5272.dl.dropboxusercontent.com/cd/0/get/CUt6hgx8fzHNgwG3DE2L6uATOW8NO-Z29i3aYZuBpDPMO0zl7FozaT_teINB7LpErbqL5RUjd9h8mQnHxq3a33zmmt2l-BV0_Gfqha1K5Kn_qr9xN32NIJXnj4V6c24RjAWm2... Redirect Chain
|
868 KB 868 KB |
Image
application/binary |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
tracking
qg02.s2.wtf/api/ |
0 279 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
tracking
qg02.s2.wtf/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
if_logo.207fffe8.svg
samsp-cha-qg02.web.app/img/ |
995 B 868 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
937 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
samsp-cha-qg02.web.app/ |
15 KB 3 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkphishing_page object| __VUE_INSTANCE_SETTERS__ function| Accordion function| initAccordions function| Collapse function| initCollapses function| Carousel function| initCarousels function| Dismiss function| initDismisses function| Dropdown function| initDropdowns function| Modal function| initModals function| Drawer function| initDrawers function| Tabs function| initTabs function| Tooltip function| initTooltips function| Popover function| initPopovers function| Dial function| initDials function| initFlowbite function| Pusher boolean| __VUE__3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.dropbox.com/ | Name: gvc Value: NDkxODk5MzIwOTQ4MzAxMTY4NDM2NzgwMDM3MDU2NDA1MTM3OTY= |
|
.dropbox.com/ | Name: t Value: QULt4ttNb1VJi14laZc7VNZG |
|
www.dropbox.com/ | Name: __Host-js_csrf Value: QULt4ttNb1VJi14laZc7VNZG |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
freeipapi.com
qg02.s2.wtf
samsp-cha-qg02.web.app
ucb98f63ae1231d29c6ca0bf5272.dl.dropboxusercontent.com
www.dropbox.com
188.114.97.3
199.36.158.100
2620:0:890::100
2620:100:6022:15::a27d:420f
2620:100:6022:18::a27d:4212
34.87.62.255
11884a5f3b5544cbb10aa0f1ca9d80c902ad2bd996741bb96d9d4af79ddf7b39
2c75422622201c7cbb61a361f270cb7086811f56ef48f3564cc4d20291dc53a6
49ae0a7898048f958aaf9006f93b193e150351b88a7cf44087c48750d5e3c50f
71efa523e15a93e26d0c12f41be9f72970c13e5a7b6a9538386531ad2bf5af5f
7f6daf503a854efa9d097b368059fafa0c47354a6e19b08354c8d77eed8438fd
ae6fde29afbcea771a638c6bcab07063b2209f3c074fef4139f8d11edefd0711
be578f17ca3f769dbb54636a132ebea1367c53b02e92af96c5ff41e53007082e
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f3e46a6556f48d3aa959914ea9a1c29ed4af124befb30aa683605d5e1fba0068
f7a8d8672564ab6afaabc6b7439155ac06e221f2413c1311d780d537ffd5e547