5-9kk.pages.dev
Open in
urlscan Pro
172.66.44.162
Malicious Activity!
Public Scan
Submission: On December 24 via api from AU — Scanned from AU
Summary
TLS certificate: Issued by GTS CA 1P5 on October 30th 2023. Valid for: 3 months.
This is the only time 5-9kk.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 172.66.44.162 172.66.44.162 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.26.9.175 104.26.9.175 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 18.67.93.31 18.67.93.31 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 104.26.3.150 104.26.3.150 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 138.197.235.123 138.197.235.123 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 104.18.24.163 104.18.24.163 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 6 |
ASN16509 (AMAZON-02, US)
PTR: server-18-67-93-31.syd62.r.cloudfront.net
logo.clearbit.com |
ASN14061 (DIGITALOCEAN-ASN, US)
somber-science.surge.sh | |
possessive-ducks.surge.sh |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
surge.sh
somber-science.surge.sh possessive-ducks.surge.sh |
63 KB |
1 |
gyazo.com
i.gyazo.com — Cisco Umbrella Rank: 102961 |
328 KB |
1 |
thehackernews.com
thehackernews.com — Cisco Umbrella Rank: 177472 |
17 KB |
1 |
clearbit.com
logo.clearbit.com — Cisco Umbrella Rank: 24407 |
|
1 |
1000logos.net
1000logos.net — Cisco Umbrella Rank: 74088 |
30 KB |
1 |
pages.dev
5-9kk.pages.dev |
4 KB |
9 | 6 |
Domain | Requested by | |
---|---|---|
3 | possessive-ducks.surge.sh |
5-9kk.pages.dev
|
1 | i.gyazo.com |
5-9kk.pages.dev
|
1 | somber-science.surge.sh |
5-9kk.pages.dev
|
1 | thehackernews.com |
5-9kk.pages.dev
|
1 | logo.clearbit.com |
5-9kk.pages.dev
|
1 | 1000logos.net |
5-9kk.pages.dev
|
1 | 5-9kk.pages.dev | |
9 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
5-9kk.pages.dev GTS CA 1P5 |
2023-10-30 - 2024-01-28 |
3 months | crt.sh |
1000logos.net Cloudflare Inc ECC CA-3 |
2023-09-19 - 2024-09-18 |
a year | crt.sh |
clearbit.com Amazon RSA 2048 M03 |
2023-09-18 - 2024-10-17 |
a year | crt.sh |
thehackernews.com GTS CA 1P5 |
2023-12-17 - 2024-03-16 |
3 months | crt.sh |
*.surge.sh Sectigo RSA Domain Validation Secure Server CA |
2023-04-23 - 2024-05-18 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-04 - 2024-05-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://5-9kk.pages.dev/
Frame ID: A4837A24AA0AFF7F653F14B0B7A2B3AC
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
5-9kk.pages.dev/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Adobe-logo.png
1000logos.net/wp-content/uploads/2021/04/ |
30 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
[[_domain]]
logo.clearbit.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adobe-security-patch.png
thehackernews.com/images/-8YcaVavNgEU/Xw3EDfS1gCI/AAAAAAAAAzE/f2He_zpi6YIe4ENJ0SbadyVr-O8fpXFHACLcBGAsYHQ/s728-rw-ft-e30/ |
17 KB 17 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WEBMAILAPS-720x285.jpg
somber-science.surge.sh/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
outlook.png
possessive-ducks.surge.sh// |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
netease_png.png
possessive-ducks.surge.sh/ |
992 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aol.jpg
possessive-ducks.surge.sh/ |
36 KB 37 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
005d93f25fcf357443b2278707b552c5.png
i.gyazo.com/ |
327 KB 328 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture string| m string| d function| cc function| cd function| step1 function| step2 function| se function| validate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
i.gyazo.com/ | Name: Gyazo_cfwoker Value: i |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1000logos.net
5-9kk.pages.dev
i.gyazo.com
logo.clearbit.com
possessive-ducks.surge.sh
somber-science.surge.sh
thehackernews.com
104.18.24.163
104.26.3.150
104.26.9.175
138.197.235.123
172.66.44.162
18.67.93.31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