dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev Open in urlscan Pro
104.21.38.165  Malicious Activity! Public Scan

URL: https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
Submission: On August 21 via manual from HU — Scanned from CA

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 104.21.38.165, located in and belongs to CLOUDFLARENET, US. The main domain is dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev.
TLS certificate: Issued by GTS CA 1P5 on August 21st 2023. Valid for: 3 months.
This is the only time dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
2 104.21.38.165 13335 (CLOUDFLAR...)
1 156.146.36.23 60068 (CDN77 ^_^)
1 173.231.16.76 18450 (WEBNX)
4 4
Apex Domain
Subdomains
Transfer
2 workers.dev
dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
9 KB
1 ipify.org
api.ipify.org — Cisco Umbrella Rank: 2820
205 B
1 icons8.com
img.icons8.com — Cisco Umbrella Rank: 36059
2 KB
4 3
Domain Requested by
2 dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
1 api.ipify.org dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
1 img.icons8.com dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
4 3

This site contains no links.

Subject Issuer Validity Valid
dhetqnlgrkrafdjcit.workers.dev
GTS CA 1P5
2023-08-21 -
2023-11-19
3 months crt.sh
1004834818.rsc.cdn77.org
R3
2023-07-09 -
2023-10-07
3 months crt.sh
*.ipify.org
Sectigo RSA Domain Validation Secure Server CA
2023-02-07 -
2024-02-18
a year crt.sh

This page contains 1 frames:

Primary Page: https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
Frame ID: B2E121A6A2F1DD5D2A3B775C095599D9
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Yahoo

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

11 kB
Transfer

32 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
15 KB
4 KB
Document
General
Full URL
https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.21.38.165 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bda5927ce5a4b376d80fc6a36f893dfa366989a9b388ce96035b57b388f43711

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36
accept-language
en-CA,en;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-ray
7fa45a2c18e908a1-SEA
content-encoding
br
content-type
text/html;charset=UTF-8
date
Mon, 21 Aug 2023 16:46:27 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=N6gtuhqYN18uWR%2FKmjZ%2B%2FfrdW%2Fd%2FTRUNQrJ1Ag28MFlqnR6FqO9B9u%2F4H%2BXBl11%2Bs2eMdEIeNhubyac1FE4xhjj%2FNH1wl%2BFQ7B%2B%2B4gP%2FVli4qkF4N%2BHqDApjVqrRWAbKl3ql%2FSYU%2FDwSEQu1c9ri7Myes8vFPQQ3MVw2V%2B7sGVexwQ%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
style.css
dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
15 KB
4 KB
Stylesheet
General
Full URL
https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/style.css
Requested by
Host: dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
URL: https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.21.38.165 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bda5927ce5a4b376d80fc6a36f893dfa366989a9b388ce96035b57b388f43711

Request headers

accept-language
en-CA,en;q=0.9
Referer
https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36

Response headers

date
Mon, 21 Aug 2023 16:46:27 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=8Q4R6ruX92Y0lOVpDJ2KqIIfaR4TSMs8uDH9Odlu1tZYP2ZF%2BuRLnn01TklMowdumMwDc8mA4qgxgwqzKCpEpZKoFZRUK6EbIZmLIn%2FSemnrnXGjte4QapbUI8NnxwrcpBKZZJY0P4EsMsDsiLRoo6UATxRwKlKmiT32pne3N8gXGw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/html;charset=UTF-8
cf-ray
7fa45a2cc99008a1-SEA
alt-svc
h3=":443"; ma=86400
google-logo.png
img.icons8.com/color/50/000000/
1 KB
2 KB
Image
General
Full URL
https://img.icons8.com/color/50/000000/google-logo.png
Requested by
Host: dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
URL: https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
156.146.36.23 New York, United States, ASN60068 (CDN77 ^_^, GB),
Reverse DNS
137173278.nyc.cdn77.com
Software
CDN77-Turbo /
Resource Hash
1a120e58f75551ccd9d96cdb3c285008a750de5c4eb18b66f2b036a588031955
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

accept-language
en-CA,en;q=0.9
Referer
https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36

Response headers

x-77-pop
newyorkUSNY
date
Mon, 21 Aug 2023 16:46:27 GMT
strict-transport-security
max-age=15724800; includeSubDomains
version
0.0.29
icon-format
png
x-cache
HIT
x-77-cache
HIT
x-age
153590
x-accel-date
1692482797
content-length
1335
x-77-nzt
AZySJBYwyiL/9lcCAA
x-accel-expires
@1692785197
not-found-platform
false
icon-size
50
last-modified
Wed, 26 Jul 2023 21:54:37
from-mongo-cache
true
server
CDN77-Turbo
x-77-nzt-ray
1e192d086c8058e9e394e364f9d42e2b
vary
Origin
from-redis-cache
false
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=302400
accept-ranges
bytes
icon-id
17949
/
api.ipify.org/
31 B
205 B
Script
General
Full URL
https://api.ipify.org/?format=jsonp&callback=getIP
Requested by
Host: dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev
URL: https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
173.231.16.76 , United States, ASN18450 (WEBNX, US),
Reverse DNS
173-231-16-76.static.webnx.com
Software
nginx/1.25.1 /
Resource Hash
68a881010618b33ea1a10f043571052750d7a8777d741352b71d64eadb70d3b7

Request headers

Referer
https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/
accept-language
en-CA,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Mon, 21 Aug 2023 16:46:27 GMT
Server
nginx/1.25.1
Connection
keep-alive
Content-Length
31
Vary
Origin
Content-Type
application/javascript
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0fdefe26bac6a6b0b06fe67984582f887af70b7da25d6cb1b401f9074db58338

Request headers

accept-language
en-CA,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Yahoo (Online)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture function| getIP

0 Cookies

1 Console Messages

Source Level URL
Text
javascript warning URL: https://dark-flower-c587.dhetqnlgrkrafdjcit.workers.dev/(Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://api.ipify.org/?format=jsonp&callback=getIP, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.