URL: https://ugen-orabe.web.app/
Tags: @ipnigh
Submission: On October 09 via api from GB

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 151.101.1.195, located in United States and belongs to FASTLY - Fastly, US. The main domain is ugen-orabe.web.app.
TLS certificate: Issued by GTS CA 1O1 on February 19th 2019. Valid for: a year.
This is the first time this domain was scanned on urlscan.io!

Verdict: Malicious (Score: 100/100) Show Details

  • urlscan - Score: 100
    phishing
    Phishing against Orange (Telecommunication)

Domain & IP information

IP Address AS Autonomous System
1 151.101.1.195 54113 (FASTLY)
1 2
Domain
Subdomains
Transfer
1 web.app
289 KB
1 1
Domain Requested by
1 ugen-orabe.web.app
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
web.app
GTS CA 1O1
2019-02-19 -
2020-02-18
a year

Screenshot



Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
903 KB
289 KB
Document
General
Full URL
https://ugen-orabe.web.app/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.195 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
13d38505217920de7092f1cf640fc227aea30f1e602d655376883ff9f069ed1d
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

:method
GET
:authority
ugen-orabe.web.app
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
cache-control
max-age=3600
content-encoding
gzip
content-type
text/html; charset=utf-8
etag
d8590002a27bb91bc583d0aec57ee2871117ab108a8f6a5b327eaf89551b8990
last-modified
Mon, 07 Oct 2019 04:19:25 PDT
strict-transport-security
max-age=31556926; includeSubDomains; preload
accept-ranges
bytes
date
Wed, 09 Oct 2019 23:03:32 GMT
x-served-by
cache-fra19164-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1570662212.405950,VS0,VE504
vary
x-fh-requested-host, accept-encoding
content-length
295052
data:truncated
data:truncated
172 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
695b8ce8fca527cd8148f0fbc320e43c0a0806d5e60c16d7d5cf81ff3d0d43dd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
data:truncated
data:truncated
53 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ff496a351751adbbf05c1adad44d50635dc17b6a6ea06aae0eae23e55f5c6fea

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan - Score: 100

Categories:
phishing

Tags:
phishing

Phishing against: Orange (Telecommunication)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

ugen-orabe.web.app


151.101.1.195

13d38505217920de7092f1cf640fc227aea30f1e602d655376883ff9f069ed1d
695b8ce8fca527cd8148f0fbc320e43c0a0806d5e60c16d7d5cf81ff3d0d43dd
ff496a351751adbbf05c1adad44d50635dc17b6a6ea06aae0eae23e55f5c6fea