f000.backblazeb2.com
Open in
urlscan Pro
104.153.233.177
Malicious Activity!
Public Scan
Effective URL: https://f000.backblazeb2.com/file/dagassa-diptera-kohlrabi/index.html
Submission Tags: 7068544
Submission: On April 13 via api from NL
Summary
TLS certificate: Issued by R3 on February 17th 2021. Valid for: 3 months.
This is the only time f000.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.14 67.199.248.14 | 396982 (GOOGLE-PR...) (GOOGLE-PRIVATE-CLOUD) | |
1 | 104.153.233.177 104.153.233.177 | 32354 (UNWIRED) (UNWIRED) | |
4 | 13.226.155.114 13.226.155.114 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 152.199.19.160 152.199.19.160 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2606:4700:303... 2606:4700:3037::6815:4dbc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 6 |
ASN16509 (AMAZON-02, US)
PTR: server-13-226-155-114.dus51.r.cloudfront.net
www.surveygizmo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
surveygizmo.com
www.surveygizmo.com |
360 KB |
1 |
smtptemp.site
smtptemp.site |
192 KB |
1 |
aspnetcdn.com
ajax.aspnetcdn.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
619 B |
1 |
backblazeb2.com
f000.backblazeb2.com |
86 KB |
1 |
bitly.com
1 redirects
bitly.com |
386 B |
8 | 6 |
Domain | Requested by | |
---|---|---|
4 | www.surveygizmo.com |
f000.backblazeb2.com
|
1 | smtptemp.site |
f000.backblazeb2.com
|
1 | ajax.aspnetcdn.com |
f000.backblazeb2.com
|
1 | fonts.googleapis.com |
f000.backblazeb2.com
|
1 | f000.backblazeb2.com | |
1 | bitly.com | 1 redirects |
8 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2021-02-17 - 2021-05-18 |
3 months | crt.sh |
*.surveygizmo.com Go Daddy Secure Certificate Authority - G2 |
2019-12-06 - 2022-02-02 |
2 years | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-03-16 - 2021-06-08 |
3 months | crt.sh |
*.vo.msecnd.net DigiCert SHA2 Secure Server CA |
2020-11-16 - 2021-11-10 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-05 - 2022-03-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f000.backblazeb2.com/file/dagassa-diptera-kohlrabi/index.html
Frame ID: DBCC6F4EF6274F417E00FCE025DA0E67
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://bitly.com/3ta26Qd
HTTP 301
https://f000.backblazeb2.com/file/dagassa-diptera-kohlrabi/index.html Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bitly.com/3ta26Qd
HTTP 301
https://f000.backblazeb2.com/file/dagassa-diptera-kohlrabi/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
f000.backblazeb2.com/file/dagassa-diptera-kohlrabi/ Redirect Chain
|
85 KB 86 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jscal.css
www.surveygizmo.com/2021.03.26.01/runtimejs/dist/survey/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
survey2.css
www.surveygizmo.com/2021.03.26.01/runtimejs/dist/survey/css/ |
208 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sg-icon-font.css
www.surveygizmo.com/2021.03.26.01/runtimethemes/default/runtime/css/ |
22 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
survey.js
www.surveygizmo.com/2021.03.26.01/runtimejs/dist/survey/js/ |
1018 KB 308 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 619 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
ajax.aspnetcdn.com/ajax/jQuery/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Screenshot20210310at11_04_57PM.png
smtptemp.site/email-list/edd/images/ |
191 KB 192 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)56 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _0x31c6 function| _0x3429 object| Zlib boolean| debugMode object| surveyJQueryNoConflict function| SignaturePad function| sortableStopEvent function| addSortAndRankingAccessibility function| handleDropCardSort function| handleDropCardSortClosed function| handleCreateNewCategory function| resetTheFocus function| srAlert function| translate undefined| translatedb function| $ function| jQuery object| SGAPI function| $SG function| SelectParser function| AbstractChosen function| get_side_border_padding function| Fingerprint function| SGCookie function| SG_init_page function| SGSurvey function| slider object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer object| Highcharts function| Calendar object| S6268914 string| currency_glyph_global string| optId object| that function| mg function| randomInteger function| randomString function| getdomainpartofemail function| get_email_hash function| validateEmail function| geturlparameter function| get_rand_url_pars0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.aspnetcdn.com
bitly.com
f000.backblazeb2.com
fonts.googleapis.com
smtptemp.site
www.surveygizmo.com
104.153.233.177
13.226.155.114
152.199.19.160
2606:4700:3037::6815:4dbc
2a00:1450:4001:800::200a
67.199.248.14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