f000.backblazeb2.com
Open in
urlscan Pro
104.153.233.177
Malicious Activity!
Public Scan
Effective URL: https://f000.backblazeb2.com/file/binary-cooking-1b41d69d/index.html
Submission: On January 27 via api from US
Summary
TLS certificate: Issued by R3 on December 9th 2020. Valid for: 3 months.
This is the only time f000.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
2 | 104.153.233.177 104.153.233.177 | 32354 (UNWIRED) (UNWIRED) | |
12 | 2606:4700:303... 2606:4700:3031::6815:384 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u20093930.ct.sendgrid.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
jupitersmt.com
jupitersmt.com |
241 KB |
2 |
backblazeb2.com
f000.backblazeb2.com |
76 KB |
1 |
sendgrid.net
1 redirects
u20093930.ct.sendgrid.net |
271 B |
14 | 3 |
Domain | Requested by | |
---|---|---|
12 | jupitersmt.com |
f000.backblazeb2.com
|
2 | f000.backblazeb2.com |
f000.backblazeb2.com
|
1 | u20093930.ct.sendgrid.net | 1 redirects |
14 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2020-12-09 - 2021-03-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-01 - 2021-10-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f000.backblazeb2.com/file/binary-cooking-1b41d69d/index.html
Frame ID: 25BC72DA7FD324ACF1B45CBAD48998D0
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u20093930.ct.sendgrid.net/ls/click?upn=HVivau9KqPtOjoET-2BsNThH4gF-2BhTUHGG5lb-2B9SWd9WADbl89wtmsb7Tuq...
HTTP 302
https://f000.backblazeb2.com/file/binary-cooking-1b41d69d/index.html Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u20093930.ct.sendgrid.net/ls/click?upn=HVivau9KqPtOjoET-2BsNThH4gF-2BhTUHGG5lb-2B9SWd9WADbl89wtmsb7TuqEaPKLAkZEFiDHxONTPAL8wDBgJ3hNf9s8E1FFHXy-2Bj0EvFk3Xk-3Di0VM_D-2FgZSjIkxREz5ddXbdj-2F8-2BfunwwcvY2CSx4HDxIhILplgpZpcNt7GfBA5vH329TwIuObsFD8XQrdEk9RY1mQWUiLpv95BoNqJwiMPYml-2F3hBIxT6BvvCRcOmaM2zamZAa5FRZTu7h7afPi1YxkBmmQnFY1i6fHnq3SiGbrAIZrqf8ixpsXE3NbEMYLnMLqmhdS5LqyJjtp0bnRjbriguB8dGk89rw0rT4MwU-2BT7hBnk-3D
HTTP 302
https://f000.backblazeb2.com/file/binary-cooking-1b41d69d/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
f000.backblazeb2.com/file/binary-cooking-1b41d69d/ Redirect Chain
|
76 KB 76 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
jupitersmt.com/email-list/dropboxcxcx22/img/ |
157 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
10.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
12.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
94 KB 95 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
f000.backblazeb2.com/file/binary-cooking-1b41d69d/img/ |
94 B 94 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _0x1ac9 function| _0x20da object| Zlib function| templatePage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
f000.backblazeb2.com
jupitersmt.com
u20093930.ct.sendgrid.net
104.153.233.177
167.89.123.16
2606:4700:3031::6815:384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