![](/screenshots/57d72e8b-658c-4553-aeec-b5113083116f.png)
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev
Open in
urlscan Pro
2606:4700::6812:323
Malicious Activity!
Public Scan
Submission: On October 15 via api from US — Scanned from US
Summary
TLS certificate: Issued by E1 on October 11th 2023. Valid for: 3 months.
This is the only time pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 2606:4700::68... 2606:4700::6812:323 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 192.185.14.21 192.185.14.21 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
7 | 3 |
ASN13335 (CLOUDFLARENET, US)
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: ns8253.websitewelcome.com
eatmonfamilyrecipes.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
r2.dev
1 redirects
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev |
9 KB |
2 |
eatmonfamilyrecipes.com
eatmonfamilyrecipes.com |
924 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 925 |
30 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
5 | pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev |
1 redirects
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev
|
2 | eatmonfamilyrecipes.com |
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev
code.jquery.com |
1 | code.jquery.com |
eatmonfamilyrecipes.com
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.r2.dev E1 |
2023-10-11 - 2024-01-09 |
3 months | crt.sh |
eatmonfamilyrecipes.com R3 |
2023-09-21 - 2023-12-20 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/fast.html
Frame ID: 2ADF94B4CC98974D965E90023BC0D5E9
Requests: 7 HTTP requests in this frame
Screenshot
![](/screenshots/57d72e8b-658c-4553-aeec-b5113083116f.png)
Page URL History Show full URLs
- https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/fast.html Page URL
-
https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/cdn-cgi/phish-bypass?atok=BGlW2hE0VEWiVFwLQ7Zk1y87sV6GIqQTt5kH8IK3sSM-169738...
HTTP 301
https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/fast.html Page URL
Detected technologies
Detected patterns
- /wp-(?:content|includes)/
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/fast.html Page URL
-
https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/cdn-cgi/phish-bypass?atok=BGlW2hE0VEWiVFwLQ7Zk1y87sV6GIqQTt5kH8IK3sSM-1697385198-0-%2Ffast.html
HTTP 301
https://pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/fast.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
fast.html
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.errors.css
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-exclamation.png
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/cdn-cgi/images/ |
452 B 889 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
fast.html
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/ Redirect Chain
|
268 B 576 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sc.php
eatmonfamilyrecipes.com/wp-content/bin/host22/admin/js/ |
819 B 669 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
4b13561.php
eatmonfamilyrecipes.com/wp-content/bin/host22/ |
0 255 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| scr string| stc number| autograb function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev/ | Name: __cf_mw_byp Value: BGlW2hE0VEWiVFwLQ7Zk1y87sV6GIqQTt5kH8IK3sSM-1697385198-0-/fast.html |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
eatmonfamilyrecipes.com
pub-0ad66ba6942d4cf69a244656dc92a46c.r2.dev
192.185.14.21
2606:4700::6812:323
2a04:4e42:600::649
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
28b563456ae25b6e7b93271b10fec852df4a7a2de1eb6f292c18aa68ac577c64
66e20e108efa4f999cd8f7bca7e3f3b2dbedbf1622f6ace4a423cacee47a4ea0
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
b54dc67a48401bd57a1cecdfdf2d8161d39e825b5fb069fbf17d17b689b94bba
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016