gem2xgiveaway-doge.blogspot.com
Open in
urlscan Pro
172.217.23.97
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On October 25 via api from FI — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1C3 on October 4th 2021. Valid for: 3 months.
This is the only time gem2xgiveaway-doge.blogspot.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 172.217.23.97 172.217.23.97 | 15169 (GOOGLE) (GOOGLE) | |
2 | 142.250.184.233 142.250.184.233 | 15169 (GOOGLE) (GOOGLE) | |
1 | 69.16.175.10 69.16.175.10 | 33438 (HIGHWINDS2) (HIGHWINDS2) | |
1 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 2 | 51.91.224.95 51.91.224.95 | 16276 (OVH) (OVH) | |
7 | 6 |
ASN15169 (GOOGLE, US)
PTR: mil04s23-in-f97.1e100.net
gem2xgiveaway-doge.blogspot.com |
ASN15169 (GOOGLE, US)
PTR: fra24s12-in-f9.1e100.net
www.blogger.com |
ASN33438 (HIGHWINDS2, US)
PTR: tlb.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
postimg.cc
1 redirects
i.postimg.cc |
6 KB |
2 |
blogger.com
www.blogger.com |
184 KB |
2 |
blogspot.com
gem2xgiveaway-doge.blogspot.com |
179 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
11 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
7 | 5 |
Domain | Requested by | |
---|---|---|
2 | i.postimg.cc |
1 redirects
gem2xgiveaway-doge.blogspot.com
|
2 | www.blogger.com |
gem2xgiveaway-doge.blogspot.com
|
2 | gem2xgiveaway-doge.blogspot.com |
gem2xgiveaway-doge.blogspot.com
|
1 | maxcdn.bootstrapcdn.com |
gem2xgiveaway-doge.blogspot.com
|
1 | code.jquery.com |
gem2xgiveaway-doge.blogspot.com
|
7 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
misc-sni.blogspot.com GTS CA 1C3 |
2021-10-04 - 2021-12-27 |
3 months | crt.sh |
*.blogger.com GTS CA 1C3 |
2021-10-04 - 2021-12-27 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
postimg.cc R3 |
2021-09-30 - 2021-12-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://gem2xgiveaway-doge.blogspot.com/
Frame ID: EEB5B7DD4F55FA9ADE23F89BEF33665D
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
92996812 DOGE left92 886 411 DOGE leftDetected technologies
Blogger (Blogs) ExpandDetected patterns
- ^https?://[^/]+\.(?:blogspot|blogger)\.com
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://i.postimg.cc/nz68L4yx/DOGE.pngD7Mp8gU5WmGPojbx1ij3UV1JrHiUEWJwr9&chld=H%7C0 HTTP 301
- https://i.postimg.cc/nz68L4yx/DOGE.png
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
gem2xgiveaway-doge.blogspot.com/ |
722 KB 176 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1394523530-widget_css_bundle.css
www.blogger.com/static/v1/widgets/ |
30 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.slim.min.js
code.jquery.com/ |
69 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3210254948-widgets.js
www.blogger.com/static/v1/widgets/ |
154 KB 154 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookienotice.js
gem2xgiveaway-doge.blogspot.com/js/ |
6 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
69 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DOGE.png
i.postimg.cc/nz68L4yx/ Redirect Chain
|
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)67 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery object| cookieChoices string| ADDRESS object| adsbygoogle function| wait function| random function| uuidv4 function| bet function| removeArr function| addLink function| sub function| newtr function| insertAfter function| updateTrans function| setProgress number| ctd object| times object| clipboard function| BLOG_attachCsiOnload function| _WidgetManager function| _WidgetInfo function| widget_module_provide function| _AdSenseView function| _BlogArchiveView function| _AttributionView function| _BlogView function| _BlogListView function| _BlogSearchView function| _ContactFormView function| _ExampleView function| _FeaturedPostView function| _FeedView function| _FollowersView function| _HeaderView function| _TextView function| _HTMLView function| _ImageView function| _LabelView function| _TextListView function| _LinkListView function| _BloggerButtonView function| _NavbarView function| _PageListView function| _PollView function| _PopularPostsView function| _ProfileView function| _RecentPostsView function| _ReportAbuseView function| _SharingView function| _StatsView function| _SubscribeView function| _SW_toggleReaderList function| _SW_hideReaderList function| _TranslateView function| _WikipediaView string| __wavt object| tr string| INT string| OUT string| TXID string| TXID2 string| INCIN string| INOUT number| trans0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
gem2xgiveaway-doge.blogspot.com
i.postimg.cc
maxcdn.bootstrapcdn.com
www.blogger.com
104.18.11.207
142.250.184.233
172.217.23.97
51.91.224.95
69.16.175.10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