large-issue-request-page-01.surge.sh
Open in
urlscan Pro
138.68.112.220
Malicious Activity!
Public Scan
Effective URL: https://large-issue-request-page-01.surge.sh/
Submission: On July 27 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on April 19th 2024. Valid for: a year.
This is the only time large-issue-request-page-01.surge.sh was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 138.68.112.220 138.68.112.220 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 2a00:1450:400... 2a00:1450:4001:813::200a | 15169 (GOOGLE) (GOOGLE) | |
11 | 2 |
ASN14061 (DIGITALOCEAN-ASN, US)
large-issue-request-page-01.surge.sh |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
surge.sh
large-issue-request-page-01.surge.sh |
224 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
1 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | large-issue-request-page-01.surge.sh |
large-issue-request-page-01.surge.sh
|
1 | fonts.googleapis.com |
large-issue-request-page-01.surge.sh
|
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.facebook.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.surge.sh Sectigo RSA Domain Validation Secure Server CA |
2024-04-19 - 2025-05-18 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-07-01 - 2024-09-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://large-issue-request-page-01.surge.sh/
Frame ID: 1D02B19C6D0508C5840B0F0EBAFB403C
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
FacebookPage URL History Show full URLs
-
http://large-issue-request-page-01.surge.sh/
HTTP 307
https://large-issue-request-page-01.surge.sh/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://large-issue-request-page-01.surge.sh/
HTTP 307
https://large-issue-request-page-01.surge.sh/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
large-issue-request-page-01.surge.sh/ Redirect Chain
|
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index-d246d0d3.css
large-issue-request-page-01.surge.sh/ |
336 KB 47 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
large-issue-request-page-01.surge.sh/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.css
large-issue-request-page-01.surge.sh/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.min.css
large-issue-request-page-01.surge.sh/ |
100 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
large-issue-request-page-01.surge.sh/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.css
large-issue-request-page-01.surge.sh/ |
486 KB 82 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
large-issue-request-page-01.surge.sh/ |
156 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TbXLmqW3Z.png
large-issue-request-page-01.surge.sh/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
12 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhZp13AM.ico
large-issue-request-page-01.surge.sh/ |
8 KB 8 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
large-issue-request-page-01.surge.sh
138.68.112.220
2a00:1450:4001:813::200a
00008d2a6bb44551ff155148e5fedbcc0fdf8d710d908581fdf04dd96dfb31ca
2529c7d2b862f38fe93e9881605c235abf25c81823554c2a1d013931f070571a
2ff5b959fa9f6b4b1d04d20a37d706e90039176ab1e2a202994d9580baeebfd6
552b316e5b535ba9e456aad19ed48e2a4386c7093398190269a2648c08f25939
5d37f9379291a60f698c2ed035bf47041f32a53251424774300f079e73d33468
7794957586447e251b87cc7e1281c284bd5f342908f09864f4ee9a7292966faa
96cf88058208aa0373a2b7f2b80ed6f2096de69026bfb1048f9409d63f68ade1
9f462f84c30887467d030d2bd6c74915792285619fda8427a2088c40e564f8a6
b02be119005317ec456772e7f9f4e227824717117f1856a0f4ec84cbc8858c01
dca9ce0b54fec31a848c0bd3feae5e0b7e6895e0ac15068d014f45d7c3916913
f6062884a7a6b7f3b8f1d40607619344f798b1442466ee1cba691f060174acef