metamask.github.io
Open in
urlscan Pro
2606:50c0:8000::153
Public Scan
Effective URL: https://metamask.github.io/phishing-warning/v2.0.1/index.html
Submission: On March 25 via manual from IL — Scanned from DE
Summary
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on February 21st 2023. Valid for: a year.
This is the only time metamask.github.io was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:50c0:800... 2606:50c0:8001::153 | 54113 (FASTLY) (FASTLY) | |
8 | 2606:50c0:800... 2606:50c0:8000::153 | 54113 (FASTLY) (FASTLY) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
github.io
1 redirects
metamask.github.io — Cisco Umbrella Rank: 28673 |
96 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
9 | metamask.github.io |
1 redirects
metamask.github.io
|
8 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
cryptoscamdb.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.github.io DigiCert TLS RSA SHA256 2020 CA1 |
2023-02-21 - 2024-03-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://metamask.github.io/phishing-warning/v2.0.1/index.html
Frame ID: B94829B592D743D44CEA7AC3F25A0889
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
MetaMask Phishing DetectionPage URL History Show full URLs
-
http://metamask.github.io/phishing-warning/v2.0.1/index.html
HTTP 301
https://metamask.github.io/phishing-warning/v2.0.1/index.html Page URL
Detected technologies
GitHub Pages (CDN) ExpandDetected patterns
- ^https?://[^/]+\.github\.io
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Learn more
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://metamask.github.io/phishing-warning/v2.0.1/index.html
HTTP 301
https://metamask.github.io/phishing-warning/v2.0.1/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
metamask.github.io/phishing-warning/v2.0.1/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
globalthis.js
metamask.github.io/phishing-warning/v2.0.1/ |
9 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lockdown-install.js
metamask.github.io/phishing-warning/v2.0.1/ |
160 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lockdown-run.js
metamask.github.io/phishing-warning/v2.0.1/ |
825 B 657 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lockdown-more.js
metamask.github.io/phishing-warning/v2.0.1/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bundle.js
metamask.github.io/phishing-warning/v2.0.1/ |
181 KB 52 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
design-tokens.css
metamask.github.io/phishing-warning/v2.0.1/ |
18 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
metamask.github.io/phishing-warning/v2.0.1/ |
4 KB 982 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| assert0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
metamask.github.io
2606:50c0:8000::153
2606:50c0:8001::153
107f12c90ce6e47c34a61f5acbcffc2bfaf512c6c15703cb73e401acd720466a
10fd152f5e1c9bbc4cd828138125feaf94531fb4d5f94b64e98042ba475bf58c
23b49935bae738c4da12c00dc12ef808b44155e080e55f7928f44d98d797a146
6e3cec55e98318a6ddcaad119e11aabdae7cf1eb849004625182aec7524ad30d
8a48cc29d223f53657b0c2d5da11ed12653187672a8bea4f4d78f97e7c78c849
94422146a6d2fa709726b507aee6a6429a780b99a905f28a25912aa161195d9a
a2772e857706001a485e8a11ad307037baaf8927a80749c033d6a318f0031262
dc45bf034faf3761fce0e054677c2e7e4a511917cd41518f72b96cb9486f5b18