jovial-carson-9ea7ef.netlify.app
Open in
urlscan Pro
2a03:b0c0:3:e0::27e:2001
Malicious Activity!
Public Scan
Submission: On September 13 via api from TW
Summary
TLS certificate: Issued by AlphaSSL CA - SHA256 - G2 on March 4th 2020. Valid for: a year.
This is the only time jovial-carson-9ea7ef.netlify.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a03:b0c0:3:e... 2a03:b0c0:3:e0::27e:2001 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 3 | 107.180.46.151 107.180.46.151 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
1 | 2606:4700:20:... 2606:4700:20::681a:164 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 67.202.94.86 67.202.94.86 | 32748 (STEADFAST) (STEADFAST) | |
6 | 5 |
ASN14061 (DIGITALOCEAN-ASN, US)
jovial-carson-9ea7ef.netlify.app |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
PTR: ip-107-180-46-151.ip.secureserver.net
zenosama.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
zenosama.xyz
1 redirects
zenosama.xyz |
505 KB |
2 |
amung.us
whos.amung.us |
56 B |
1 |
geojs.io
get.geojs.io |
831 B |
1 |
netlify.app
jovial-carson-9ea7ef.netlify.app |
2 KB |
6 | 4 |
Domain | Requested by | |
---|---|---|
3 | zenosama.xyz |
1 redirects
jovial-carson-9ea7ef.netlify.app
|
2 | whos.amung.us | |
1 | get.geojs.io |
jovial-carson-9ea7ef.netlify.app
|
1 | jovial-carson-9ea7ef.netlify.app | |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.netlify.app AlphaSSL CA - SHA256 - G2 |
2020-03-04 - 2021-03-05 |
a year | crt.sh |
zenosama.xyz ZeroSSL RSA Domain Secure Site CA |
2020-08-17 - 2020-11-15 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-07-09 - 2021-07-09 |
a year | crt.sh |
whos.amung.us Sectigo RSA Domain Validation Secure Server CA |
2020-05-21 - 2022-05-21 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://jovial-carson-9ea7ef.netlify.app/
Frame ID: DA799D1FB3BD294F8A64C33DC092FB91
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://zenosama.xyz/luigi/location HTTP 301
- https://zenosama.xyz/luigi/location/
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jovial-carson-9ea7ef.netlify.app/ |
12 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
zenosama.xyz/luigi/ |
718 KB 504 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
zenosama.xyz/luigi/location/ Redirect Chain
|
1 KB 495 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
geo.json
get.geojs.io/v1/ip/ |
363 B 831 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
29 B 29 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
27 B 27 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
51 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| bannedips string| ip object| handleips function| sh boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt undefined| to_object string| a function| checking function| creatingInput function| searchingForms0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
9 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
get.geojs.io
jovial-carson-9ea7ef.netlify.app
whos.amung.us
zenosama.xyz
107.180.46.151
2606:4700:20::681a:164
2a03:b0c0:3:e0::27e:2001
67.202.94.86
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f
72c028859b55f2e3b8abd538ddd97163b477ab42caa1e96f343d0d61280d684f
99f1910b1b8b7c62e24a51864bf7f1b7f1b7a2c1b7295c73de20a68efb95728b
ce0b3cc4048b5dd27f352533ac47cbdef8f4bb9a5170a7fa6d2a917428946599
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f842ab309aa9f53cd073d72974719eb22efc708cf017f9a09d41646f59c90716