qver04-39944.web.app
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Submission: On January 24 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1D4 on January 17th 2024. Valid for: 3 months.
This is the only time qver04-39944.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
web.app
qver04-39944.web.app |
1 MB |
1 |
freeipapi.com
freeipapi.com — Cisco Umbrella Rank: 120671 |
742 B |
0 |
road.sh
Failed
duma04.road.sh Failed |
|
0 |
chingman.net
Failed
chingman.net Failed |
|
9 | 4 |
Domain | Requested by | |
---|---|---|
5 | qver04-39944.web.app |
qver04-39944.web.app
|
1 | freeipapi.com |
qver04-39944.web.app
|
0 | duma04.road.sh Failed |
qver04-39944.web.app
|
0 | chingman.net Failed |
qver04-39944.web.app
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
web.app GTS CA 1D4 |
2024-01-17 - 2024-04-16 |
3 months | crt.sh |
freeipapi.com Cloudflare Inc ECC CA-3 |
2024-01-21 - 2024-12-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://qver04-39944.web.app/
Frame ID: 9A0C6F3F2B39F83800BDFB5E678FACB0
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
qver04-39944.web.app/ |
575 B 576 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.9b9f46c3.js
qver04-39944.web.app/js/ |
298 KB 81 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.aba71a13.js
qver04-39944.web.app/js/ |
107 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.eac239d4.css
qver04-39944.web.app/css/ |
35 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
json
freeipapi.com/api/ |
293 B 742 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
loadingLogo.085728eb.gif
qver04-39944.web.app/img/ |
1 MB 1 MB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
27baHo4dN_O.png
chingman.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
tracking
duma04.road.sh/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS |
tracking
duma04.road.sh/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- chingman.net
- URL
- https://chingman.net/27baHo4dN_O.png
- Domain
- duma04.road.sh
- URL
- https://duma04.road.sh/api/tracking
- Domain
- duma04.road.sh
- URL
- https://duma04.road.sh/api/tracking
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkphishing_page object| __VUE_INSTANCE_SETTERS__ function| Accordion function| initAccordions function| Collapse function| initCollapses function| Carousel function| initCarousels function| Dismiss function| initDismisses function| Dropdown function| initDropdowns function| Modal function| initModals function| Drawer function| initDrawers function| Tabs function| initTabs function| Tooltip function| initTooltips function| Popover function| initPopovers function| Dial function| initDials function| initFlowbite function| Pusher boolean| __VUE__0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
chingman.net
duma04.road.sh
freeipapi.com
qver04-39944.web.app
chingman.net
duma04.road.sh
2620:0:890::100
2a06:98c1:3120::3
0aafabb1b825612490c8848e0834b46143f0c6750074a457977833108b6a5837
49ae0a7898048f958aaf9006f93b193e150351b88a7cf44087c48750d5e3c50f
5267ed9e67d14775ec4c39e1df1ddd79e73c1027b648b01b2898c2fd26fd9ef4
5fbc86db20906528aea6f8a973940902e9903e60f393edf8d2841cc643cb7ce4
74c7096c56dd2e16a0caa263c7d52f093f52376769aa25c16f1578bc520f2380
c296b7a52bb832ae0bdb761d86989ce156c5cff905215c534c34d76f0474ca2c