f000.backblazeb2.com
Open in
urlscan Pro
104.153.233.177
Malicious Activity!
Public Scan
Effective URL: https://f000.backblazeb2.com/file/allergins-commandment-demophobe/index.html
Submission: On April 08 via manual from US
Summary
TLS certificate: Issued by R3 on February 17th 2021. Valid for: 3 months.
This is the only time f000.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 185.119.88.77 185.119.88.77 | 12459 (UNITED) (UNITED) | |
2 | 104.153.233.177 104.153.233.177 | 32354 (UNWIRED) (UNWIRED) | |
12 | 2606:4700:303... 2606:4700:3037::6815:4dbc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
smtptemp.site
smtptemp.site |
241 KB |
2 |
backblazeb2.com
f000.backblazeb2.com |
4 KB |
2 |
fondacijadejanpandurovic.rs
1 redirects
fondacijadejanpandurovic.rs |
588 B |
15 | 3 |
Domain | Requested by | |
---|---|---|
12 | smtptemp.site |
f000.backblazeb2.com
|
2 | f000.backblazeb2.com |
fondacijadejanpandurovic.rs
f000.backblazeb2.com |
2 | fondacijadejanpandurovic.rs | 1 redirects |
15 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2021-02-17 - 2021-05-18 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-05 - 2022-03-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f000.backblazeb2.com/file/allergins-commandment-demophobe/index.html
Frame ID: FA0F09930BECEA23AAD2A4EE6A83A8FE
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://fondacijadejanpandurovic.rs/cap/redirect
HTTP 301
http://fondacijadejanpandurovic.rs/cap/redirect/ Page URL
- https://f000.backblazeb2.com/file/allergins-commandment-demophobe/index.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://fondacijadejanpandurovic.rs/cap/redirect
HTTP 301
http://fondacijadejanpandurovic.rs/cap/redirect/ Page URL
- https://f000.backblazeb2.com/file/allergins-commandment-demophobe/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://fondacijadejanpandurovic.rs/cap/redirect HTTP 301
- http://fondacijadejanpandurovic.rs/cap/redirect/
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
fondacijadejanpandurovic.rs/cap/redirect/ Redirect Chain
|
142 B 368 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
f000.backblazeb2.com/file/allergins-commandment-demophobe/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
smtptemp.site/email-list/dropboxcxcx22/img/ |
157 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
48 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
10.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
12.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
smtptemp.site/email-list/dropboxcxcx22/img/ |
94 KB 95 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
f000.backblazeb2.com/file/allergins-commandment-demophobe/img/ |
94 B 94 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| templatePage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
f000.backblazeb2.com
fondacijadejanpandurovic.rs
smtptemp.site
104.153.233.177
185.119.88.77
2606:4700:3037::6815:4dbc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