workers-playground-red-credit-596b.dominickm.workers.dev
Open in
urlscan Pro
2606:4700:3034::ac43:c4a9
Malicious Activity!
Public Scan
Submission: On January 13 via api from US — Scanned from US
Summary
TLS certificate: Issued by E1 on December 3rd 2023. Valid for: 3 months.
This is the only time workers-playground-red-credit-596b.dominickm.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DocuSign (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3034::ac43:c4a9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 54.253.76.144 54.253.76.144 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 44.208.108.45 44.208.108.45 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 4 |
ASN13335 (CLOUDFLARENET, US)
workers-playground-red-credit-596b.dominickm.workers.dev |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-253-76-144.ap-southeast-2.compute.amazonaws.com
ada978-docusign.webnotifications.net |
ASN14618 (AMAZON-AES, US)
PTR: ec2-44-208-108-45.compute-1.amazonaws.com
noon-working-oil.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2998 |
15 KB |
1 |
glitch.me
noon-working-oil.glitch.me |
84 KB |
1 |
webnotifications.net
ada978-docusign.webnotifications.net |
4 KB |
1 |
workers.dev
workers-playground-red-credit-596b.dominickm.workers.dev |
5 KB |
4 | 4 |
Domain | Requested by | |
---|---|---|
1 | stackpath.bootstrapcdn.com |
workers-playground-red-credit-596b.dominickm.workers.dev
|
1 | noon-working-oil.glitch.me |
workers-playground-red-credit-596b.dominickm.workers.dev
|
1 | ada978-docusign.webnotifications.net |
workers-playground-red-credit-596b.dominickm.workers.dev
|
1 | workers-playground-red-credit-596b.dominickm.workers.dev | |
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dominickm.workers.dev E1 |
2023-12-03 - 2024-03-02 |
3 months | crt.sh |
authwebmail.com Amazon RSA 2048 M01 |
2023-06-11 - 2024-07-10 |
a year | crt.sh |
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2023-11-30 - 2024-02-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://workers-playground-red-credit-596b.dominickm.workers.dev/
Frame ID: 12D356EF07D6A1EC54AD363144D387B8
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
DocuSign - LoginDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
workers-playground-red-credit-596b.dominickm.workers.dev/ |
15 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
docusign-logo.png
ada978-docusign.webnotifications.net/docusign/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
noon-working-oil.glitch.me/ |
84 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DocuSign (Online)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| image_save_msg string| no_menu_msg string| smessage function| disableEnterKey function| wccp_free_iscontenteditable function| disable_copy function| disable_copy_ie function| reEnable function| disableSelection function| onlongtouch undefined| timer number| touchduration string| elemtype function| touchstart function| touchend function| wccp_pro_is_passive function| nocontext function| $ function| jQuery object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ada978-docusign.webnotifications.net
noon-working-oil.glitch.me
stackpath.bootstrapcdn.com
workers-playground-red-credit-596b.dominickm.workers.dev
2606:4700:3034::ac43:c4a9
2606:4700::6812:bcf
44.208.108.45
54.253.76.144
0967c7ce43f94fc0fff220c107a7d024c13d609d5efcddbc4ab8b500f0a38db0
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
e83f8d0b4a78d14185abfca96ee2fbaf18e396a047f725d944ff27a845787279
fdce77a6d0053f32d231518a84a71bcab5c86045ed52369da00b89d4284aef46