lj1rf.csb.app
Open in
urlscan Pro
2606:4700::6812:1b72
Malicious Activity!
Public Scan
Submission: On September 16 via manual from US
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 14th 2020. Valid for: a year.
This is the only time lj1rf.csb.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700::68... 2606:4700::6812:1b72 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6812:16cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 54.175.226.183 54.175.226.183 | 14618 (AMAZON-AES) (AMAZON-AES) | |
7 | 151.101.1.195 151.101.1.195 | 54113 (FASTLY) (FASTLY) | |
4 | 2606:4700::68... 2606:4700::6810:7baf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700::68... 2606:4700::6811:4e6b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:81c::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2620:1ec:29::10 2620:1ec:29::10 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
21 | 8 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-175-226-183.compute-1.amazonaws.com
ameizoxposaewe.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
web.app
vipcndvvappdev.web.app |
182 KB |
4 |
cloudflare.com
cdnjs.cloudflare.com |
31 KB |
4 |
unpkg.com
unpkg.com |
75 KB |
2 |
codesandbox.io
codesandbox.io |
8 KB |
1 |
msauth.net
aadcdn.msauth.net |
1 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
herokuapp.com
ameizoxposaewe.herokuapp.com |
4 KB |
1 |
csb.app
lj1rf.csb.app |
3 KB |
21 | 8 |
Domain | Requested by | |
---|---|---|
7 | vipcndvvappdev.web.app |
lj1rf.csb.app
|
4 | cdnjs.cloudflare.com |
lj1rf.csb.app
|
4 | unpkg.com |
lj1rf.csb.app
|
2 | codesandbox.io |
lj1rf.csb.app
|
1 | aadcdn.msauth.net |
lj1rf.csb.app
|
1 | ajax.googleapis.com |
lj1rf.csb.app
|
1 | ameizoxposaewe.herokuapp.com |
lj1rf.csb.app
|
1 | lj1rf.csb.app | |
21 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-06-14 - 2021-06-14 |
a year | crt.sh |
codesandbox.io Cloudflare Inc ECC CA-3 |
2020-06-19 - 2021-06-19 |
a year | crt.sh |
*.herokuapp.com DigiCert SHA2 High Assurance Server CA |
2020-06-15 - 2021-07-07 |
a year | crt.sh |
web.app GTS CA 1O1 |
2020-04-15 - 2021-04-14 |
a year | crt.sh |
cdnjs.cloudflare.com DigiCert ECC Secure Server CA |
2020-08-12 - 2022-08-17 |
2 years | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-08-26 - 2020-11-18 |
3 months | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2020-07-08 - 2021-07-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://lj1rf.csb.app/?bbre=329isdids
Frame ID: 6EDC2E8945A3490ECF427BE713385861
Requests: 21 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
lj1rf.csb.app/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.js
codesandbox.io/public/sse-hooks/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.d47e1de20.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
VEo1Nnp0K1huYk1yRW95M25KZ05JbFBMZHlvWlM5VlFKNWdEaGJxbmhWZ1NFdm9KUndDSG94czdxS0lIZFQ2Nm83QkZkNVFidWdocGxpaEZGbWhoMHpMZ3l1T3dDTkhsU3h0NkpZelBoaklUdWlxaW1rQlB1MzFLbkQ0WWxjWmFPU0o1YzZxbTAwc3hzU09saFhNN...
ameizoxposaewe.herokuapp.com/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cdf3930bc4b942e4403c1600e050eb79nbr1600277901.css
vipcndvvappdev.web.app/gwugcddf/themes/css/ |
1 KB 641 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3119d57402c17185c6f3bb87db95f746nbr1600277901.css
vipcndvvappdev.web.app/gwugcddf/themes/css/ |
128 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
unpkg.com/axios@0.16.1/dist/ |
34 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cdf3930bc4b942e4403c1600e050eb79nbr1600277901.js
vipcndvvappdev.web.app/gwugcddf/themes/ |
74 KB 18 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue.min.js
unpkg.com/vue@2.6.11/dist/ |
91 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue-router.min.js
unpkg.com/vue-router@2.7.0/dist/ |
23 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vuex.min.js
cdnjs.cloudflare.com/ajax/libs/vuex/2.3.1/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vee-validate.min.js
cdnjs.cloudflare.com/ajax/libs/vee-validate/2.0.0-rc.3/ |
42 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue-i18n.min.js
cdnjs.cloudflare.com/ajax/libs/vue-i18n/7.0.3/ |
14 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lodash.min.js
unpkg.com/lodash@4.17.4/ |
71 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mobile-detect.min.js
cdnjs.cloudflare.com/ajax/libs/mobile-detect/1.3.6/ |
37 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c0d6bf950c55d22291f75298199da02d.js
vipcndvvappdev.web.app/gwugcddf/themes/ |
401 KB 133 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a3107e4d4ae0ea783cd1177c52f1e6301600277888.js
vipcndvvappdev.web.app/gwugcddf/themes/js/ |
33 KB 14 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
vipcndvvappdev.web.app/gwugcddf/themes/imgs/ |
4 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey.svg
vipcndvvappdev.web.app/gwugcddf/themes/imgs/ |
915 B 343 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/ests/2.1/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.csb.app/ | Name: __cfduid Value: d3e33684e14afa5edc6d93b24ea66d7671600286819 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
ajax.googleapis.com
ameizoxposaewe.herokuapp.com
cdnjs.cloudflare.com
codesandbox.io
lj1rf.csb.app
unpkg.com
vipcndvvappdev.web.app
151.101.1.195
2606:4700::6810:7baf
2606:4700::6811:4e6b
2606:4700::6812:16cf
2606:4700::6812:1b72
2620:1ec:29::10
2a00:1450:4001:81c::200a
54.175.226.183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