workers-playground-tiny-shape-7eca.oracleofriches.workers.dev
Open in
urlscan Pro
172.67.212.84
Malicious Activity!
Private Scan
Submission: On June 26 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by WE1 on June 25th 2024. Valid for: 3 months.
This is the only time workers-playground-tiny-shape-7eca.oracleofriches.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 172.67.212.84 172.67.212.84 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:440... 2606:4700:4400::6812:29a9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6812:19a3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:2800:233... 2606:2800:233:1cb7:261b:1f9c:2074:3c | 15133 (EDGECAST) (EDGECAST) | |
1 | 2600:1402:d80... 2600:1402:d800:28a::523 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 6 |
ASN13335 (CLOUDFLARENET, US)
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev |
ASN13335 (CLOUDFLARENET, US)
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
workers.dev
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev |
1 KB |
1 |
cloudinary.com
res.cloudinary.com — Cisco Umbrella Rank: 3546 |
330 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1065 |
753 B |
1 |
gyazo.com
i.gyazo.com — Cisco Umbrella Rank: 90946 |
33 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 469 |
31 KB |
1 |
w3s.link
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link |
197 KB |
7 | 6 |
Domain | Requested by | |
---|---|---|
2 | workers-playground-tiny-shape-7eca.oracleofriches.workers.dev | |
1 | res.cloudinary.com |
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev
|
1 | aadcdn.msftauth.net |
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link
|
1 | i.gyazo.com |
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link
|
1 | ajax.googleapis.com |
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link
|
1 | bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link |
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev
|
7 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
oracleofriches.workers.dev WE1 |
2024-06-25 - 2024-09-23 |
3 months | crt.sh |
w3s.link E1 |
2024-05-16 - 2024-08-14 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-06-13 - 2024-09-05 |
3 months | crt.sh |
gyazo.com E1 |
2024-06-01 - 2024-08-30 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2024-05-25 - 2025-05-25 |
a year | crt.sh |
*.cloudinary.com Go Daddy Secure Certificate Authority - G2 |
2023-12-18 - 2025-01-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://workers-playground-tiny-shape-7eca.oracleofriches.workers.dev/
Frame ID: 1267725EA612E3F01C5A85F21F989702
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev/ |
143 B 579 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr762297.js
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link/ |
895 KB 197 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
78c24d6313b46234ef3d411883c0aa32.png
i.gyazo.com/ |
32 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 753 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SOA_Due_Invoice_Balances_azmehx.png
res.cloudinary.com/dvkrrftb5/image/upload/v1689743994/ |
330 KB 330 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev/ |
143 B 551 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage object| erp string| em number| tmp function| $ function| jQuery function| isBase64 function| showEl function| hideEl2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.w3s.link/ | Name: __cf_bm Value: oRRG.6vvMGXj_gCUW448ySplAaHP3tOBUZIpRhsc09Q-1719425083-1.0.1.1-bIb.thyk3UpO_tiJqPAheICP6P_zIMvoBZlRQZ_MVxQ0yeaJm4XTw34h3_.XhF3LEg35p1ZH2JUKkqgNS0iIsQ |
|
i.gyazo.com/ | Name: Gyazo_cfwoker Value: i |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
ajax.googleapis.com
bafybeih365l3oucq34ngreuq24ofl5ztpoz3rwdaim46kb32pbruzxdpyu.ipfs.w3s.link
i.gyazo.com
res.cloudinary.com
workers-playground-tiny-shape-7eca.oracleofriches.workers.dev
172.67.212.84
2600:1402:d800:28a::523
2606:2800:233:1cb7:261b:1f9c:2074:3c
2606:4700:4400::6812:29a9
2606:4700::6812:19a3
2a00:1450:4001:810::200a
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
a16936648326c111c845cfe1ab29cbbcb44d6ba6f4b1094c1dc78d7f4a7f07d0
bc466b8df7ef1aa3ba572e4979175a9d732f11b4d4e1a0f8a9d6854893232bae
bcfd0c0cd8a1be95b6020e46b66a1af9bb69a2c5941d2cf82c27c9843e9630ae
c954d8d9b404f22d0918551560161a560146a9a136354f7fe9ff7b39ad0b0fce
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d