billowing-art-bc35.toge4lvuvpskbb37059.workers.dev
Open in
urlscan Pro
2a06:98c1:3121::3
Malicious Activity!
Public Scan
Submission: On February 01 via api from GB — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1P5 on December 21st 2022. Valid for: 3 months.
This is the only time billowing-art-bc35.toge4lvuvpskbb37059.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
8 | 4 |
ASN13335 (CLOUDFLARENET, US)
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev |
ASN13335 (CLOUDFLARENET, US)
frosty-poetry-218f.glenys4.workers.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
workers.dev
1 redirects
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev frosty-poetry-218f.glenys4.workers.dev |
19 KB |
2 |
web.app
omanieu203920ixz.web.app |
13 KB |
0 |
unpkg.com
Failed
unpkg.com Failed |
|
8 | 3 |
Domain | Requested by | |
---|---|---|
5 | billowing-art-bc35.toge4lvuvpskbb37059.workers.dev |
1 redirects
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev
|
2 | omanieu203920ixz.web.app |
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev
|
1 | frosty-poetry-218f.glenys4.workers.dev |
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev
|
0 | unpkg.com Failed |
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev
|
8 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.toge4lvuvpskbb37059.workers.dev GTS CA 1P5 |
2022-12-21 - 2023-03-21 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-06 - 2023-06-05 |
a year | crt.sh |
web.app GTS CA 1D4 |
2022-12-19 - 2023-03-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/?bbre=ozxiuixz
Frame ID: CFC8F81D21404694CD2BA8A5ACF75AB1
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/?bbre=ozxiuixz Page URL
-
https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/cdn-cgi/phish-bypass?atok=Qq1E5zAdHfhpER4uTKJ5pDR3i.x5NaGRcS6fe63Yof0-167522...
HTTP 301
https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/?bbre=ozxiuixz Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/?bbre=ozxiuixz Page URL
-
https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/cdn-cgi/phish-bypass?atok=Qq1E5zAdHfhpER4uTKJ5pDR3i.x5NaGRcS6fe63Yof0-1675227359-0-%2F%3Fbbre%3Dozxiuixz
HTTP 301
https://billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/?bbre=ozxiuixz Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/cdn-cgi/images/ |
452 B 586 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/ Redirect Chain
|
7 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
63c580f425b12b698e1e9a84-63b9ab2825b12b698e1e9a59.js
frosty-poetry-218f.glenys4.workers.dev/ |
13 KB 7 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
be7397f0bb9323c79ab79a0cce85fe42nbr1673887953.css
omanieu203920ixz.web.app/bnjrjtehrsdvzxxz/themes/css/ |
1 KB 699 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c3c6ba2142b0d9c055d14b681e1a464dnbr1673887953.css
omanieu203920ixz.web.app/bnjrjtehrsdvzxxz/themes/css/ |
92 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
axios.min.js
unpkg.com/axios@0.16.1/dist/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- unpkg.com
- URL
- https://unpkg.com/axios@0.16.1/dist/axios.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange object| _0x5c1a function| _0x24eb function| _0x2fc18c function| _0x30c1ce function| _0x470c28 string| emfromgetnbrtoo object| script34ssd function| _0x2e6c7a object| _0x15da function| _0x4327 function| loadScript object| dml function| _0x1cdb391 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.billowing-art-bc35.toge4lvuvpskbb37059.workers.dev/ | Name: __cf_mw_byp Value: Qq1E5zAdHfhpER4uTKJ5pDR3i.x5NaGRcS6fe63Yof0-1675227359-0-/?bbre=ozxiuixz |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
billowing-art-bc35.toge4lvuvpskbb37059.workers.dev
frosty-poetry-218f.glenys4.workers.dev
omanieu203920ixz.web.app
unpkg.com
unpkg.com
2620:0:890::100
2a06:98c1:3121::3
2a06:98c1:3121::c
0c389b5b080607288b061ab4afe6d752bdb88aed2764d2cd449717d48ae379a4
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
118f4d0a8c85bfbe5e7dfa3162e04e73c6fcda9cf1736b28f9472aa7e03ba2af
1cc4ab266a240bfe2b79f412d509747d9ddb7031ccd8116d583c93c2969dba86
728354a2eaf016aa3bae8694ba6fd008d2c7fcc7ff2a2d213ef298db379f0596
ccd553385eba16f73ee4b7090d89cc75f4ccf200dc1766559f0b1cb078f75a87
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016