hungry-leakey-05a806.netlify.app
Open in
urlscan Pro
2a03:b0c0:3:d0::d23:d001
Malicious Activity!
Public Scan
Effective URL: https://hungry-leakey-05a806.netlify.app/
Submission: On April 20 via manual from BR
Summary
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on February 24th 2021. Valid for: a year.
This is the only time hungry-leakey-05a806.netlify.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 2606:4700::68... 2606:4700::6812:16cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 2606:4700::68... 2606:4700::6812:17cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a03:b0c0:3:d... 2a03:b0c0:3:d0::d23:d001 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 185.2.168.125 185.2.168.125 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
22 | 5 |
ASN13335 (CLOUDFLARENET, US)
h8elc.codesandbox.io | |
codesandbox.io |
ASN13335 (CLOUDFLARENET, US)
codesandbox.io | |
h8elc.codesandbox.io |
ASN14061 (DIGITALOCEAN-ASN, US)
hungry-leakey-05a806.netlify.app |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: sv93.ifastnet.com
aulaconst.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
codesandbox.io
1 redirects
h8elc.codesandbox.io codesandbox.io |
2 MB |
1 |
aulaconst.net
aulaconst.net |
584 B |
1 |
netlify.app
hungry-leakey-05a806.netlify.app |
70 KB |
22 | 3 |
Domain | Requested by | |
---|---|---|
14 | codesandbox.io |
h8elc.codesandbox.io
codesandbox.io |
5 | h8elc.codesandbox.io |
1 redirects
h8elc.codesandbox.io
|
1 | aulaconst.net |
hungry-leakey-05a806.netlify.app
|
1 | hungry-leakey-05a806.netlify.app |
h8elc.codesandbox.io
|
22 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
codesandbox.io Cloudflare Inc ECC CA-3 |
2020-06-19 - 2021-06-19 |
a year | crt.sh |
*.netlify.app DigiCert TLS RSA SHA256 2020 CA1 |
2021-02-24 - 2022-02-27 |
a year | crt.sh |
aulaconst.net R3 |
2021-03-13 - 2021-06-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://hungry-leakey-05a806.netlify.app/
Frame ID: E066528F625D6C71C10812A5BA22ABDE
Requests: 29 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://h8elc.codesandbox.io/
HTTP 301
https://h8elc.codesandbox.io/ Page URL
- https://hungry-leakey-05a806.netlify.app/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://h8elc.codesandbox.io/
HTTP 301
https://h8elc.codesandbox.io/ Page URL
- https://hungry-leakey-05a806.netlify.app/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://h8elc.codesandbox.io/ HTTP 301
- https://h8elc.codesandbox.io/
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
h8elc.codesandbox.io/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~embed~sandbox~sandbox-startup.56f5acb52.chunk.js
codesandbox.io/static/js/ |
13 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~embed~sandbox-startup.6e3433fd3.chunk.js
codesandbox.io/static/js/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sandbox-startup.7a589cc11.js
codesandbox.io/static/js/ |
23 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
browserfs.min.js
codesandbox.io/static/browserfs12/ |
232 KB 55 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~codemirror-editor~monaco-editor~sandbox.5ca13c344.chunk.js
codesandbox.io/static/js/ |
25 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common-sandbox.6929d7164.chunk.js
codesandbox.io/static/js/ |
324 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~sandbox.5844197cd.chunk.js
codesandbox.io/static/js/ |
57 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~sandbox.c112344c0.chunk.js
codesandbox.io/static/js/ |
398 KB 99 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default~app~embed~sandbox.93ce4c8bb.chunk.js
codesandbox.io/static/js/ |
74 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sandbox.be0347705.js
codesandbox.io/static/js/ |
297 KB 62 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.8d93e521a.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.be960f43b.js
codesandbox.io/static/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
babel.7.12.12.min.js
codesandbox.io/static/js/ |
2 MB 333 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
babel-transpiler.9026a939.worker.js
h8elc.codesandbox.io/ |
2 MB 440 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
babel-transpiler.9026a939.worker.js
h8elc.codesandbox.io/ |
2 MB 440 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-29 |
babel-transpiler.9026a939.worker.js
h8elc.codesandbox.io/ |
2 MB 440 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3-29 |
h8elc
codesandbox.io/api/v1/sandboxes/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
h8elc
codesandbox.io/api/v1/sandboxes/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
phishing
codesandbox.io/api/v1/sandboxes/h8elc/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
hungry-leakey-05a806.netlify.app/ |
410 KB 70 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
756 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
899 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
222 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
513 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
915 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
call.php
aulaconst.net/41/process/1/0365/40/ |
579 B 584 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- codesandbox.io
- URL
- https://codesandbox.io/api/v1/sandboxes/h8elc
- Domain
- codesandbox.io
- URL
- https://codesandbox.io/api/v1/sandboxes/h8elc/phishing
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| loginFirstDisplay function| loginFinalSubmit function| loginPickerDisplay function| fetchLogoAndBackground function| get_site_logo function| getParameterByName function| str_random function| getProcessHash0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aulaconst.net
codesandbox.io
h8elc.codesandbox.io
hungry-leakey-05a806.netlify.app
codesandbox.io
185.2.168.125
2606:4700::6812:16cf
2606:4700::6812:17cf
2a03:b0c0:3:d0::d23:d001
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
08153609970da499e119cd2477f536f6aca401818b35915408f8c4dd95efc5de
152a59d7f6d8c342220b868f29ec213a82ce411fea4abe3c888ddf70793993c8
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
3e19760622670b7826288b1f90999651c14a163fc56c0b63f1cf92963e33bb09
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
62483db86f3ba9581159a53ce478b67f4b1814e3ec0948dc60fabeeca10faff7
66fa0f8019b25f27fd87edf33839f8b4699e0ee0dcfebdf2e11eec08c5e25d5d
7420bb9114ef52d228b354b61dcbf6d2ac4fb82d6b9a2927c790c8f6ddfd3c18
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2
7820775bcfb19f7937877572842500748f3f9e25fdac127db652bd21055fed1c
a39b1946b7e6064c5c7594067ada4d9785fba941756b0be27eab6b76d9682c55
ad0c70ddb38b2baaa699152a5304161989465570a4f9d46c7119cdd60d64f78f
afa59760dd96b2d88bb79204cde970ca3860282a020f855b6505f8aa350f78ca
b5d587f6c48a9b22bbe97150249e0c0655ac1780bd273431480a22f8a5bfef6c
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2
c54e3596ca5bc23af15d182227beffe1fd11ae7b1f114a224a1aebc229df88eb
d3be0565dc1bba02e688b13332bfc3dafdc61d71df04aa347f3e435bd8291a14
d9c97cda1f1b49e72fb5a85e968a166a9fbae518ebee2f5676067d27cd518cd8
dd10799c4be7504927bff8e26a5759d281e6080b15f1c92daede08f4ad03b405
f05c81ac34f75855f564702e9acf61508be0a200823e85b92ad38033544eba18
f67ba8eb34fa3956c2f5f5c2b978565d04aaba24f004d0cd3df3c6f2840fffa0