websitezone.co
Open in
urlscan Pro
2606:4700:20::ac43:4af9
Malicious Activity!
Public Scan
Submission: On February 11 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on April 17th 2023. Valid for: a year.
This is the only time websitezone.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 2606:4700:20:... 2606:4700:20::ac43:4af9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2606:4700:20:... 2606:4700:20::681a:8e9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::2003 | 15169 (GOOGLE) (GOOGLE) | |
15 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cybeready.net
lp.cybeready.net |
40 KB |
5 |
websitezone.co
1 redirects
websitezone.co |
7 KB |
3 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 223 |
87 KB |
1 |
gstatic.com
fonts.gstatic.com |
48 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 31 |
3 KB |
15 | 5 |
Domain | Requested by | |
---|---|---|
6 | lp.cybeready.net |
websitezone.co
|
5 | websitezone.co |
1 redirects
websitezone.co
cdnjs.cloudflare.com |
3 | cdnjs.cloudflare.com |
websitezone.co
cdnjs.cloudflare.com |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
lp.cybeready.net
|
15 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-04-17 - 2024-04-16 |
a year | crt.sh |
cybeready.net Cloudflare Inc ECC CA-3 |
2023-05-19 - 2024-05-17 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-01-09 - 2024-04-02 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2024-01-09 - 2024-04-02 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://websitezone.co/3f20bffc2w32b64c05fb8b3c6bcsb9edb43c.html
Frame ID: F294F6CC16B3199CA63BB1897AC70714
Requests: 13 HTTP requests in this frame
Frame:
https://websitezone.co/cdn-cgi/challenge-platform/h/b/scripts/jsd/a990e557/main.js
Frame ID: C50976D19276E52206391438CC84A0EE
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Dropbox - Sign inDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 11- https://websitezone.co/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://websitezone.co/cdn-cgi/challenge-platform/h/b/scripts/jsd/a990e557/main.js
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
3f20bffc2w32b64c05fb8b3c6bcsb9edb43c.html
websitezone.co/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sanitize.css
lp.cybeready.net/Forms/DropBox/ |
1014 B 815 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
lp.cybeready.net/Forms/DropBox/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page.js
lp.cybeready.net/common/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
82 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validator.js
lp.cybeready.net/Forms/DropBox/ |
1 KB 803 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
lp.cybeready.net/Forms/DropBox/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sign-in-side-box.png
lp.cybeready.net/Forms/DropBox/ |
29 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
55 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/ |
47 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/fonts/ |
55 KB 56 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
websitezone.co/cdn-cgi/challenge-platform/h/b/scripts/jsd/a990e557/ Frame C509 Redirect Chain
|
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
8539a7e08d31381b
websitezone.co/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame C509 |
0 498 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
3f20bffc2w32b64c05fb8b3c6bcsb9edb43c.html
websitezone.co/ |
0 337 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| getcrrid function| $ function| jQuery object| validator2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.websitezone.co/ | Name: cf_clearance Value: 8XEhJAlKXRi2BK.oGqt59I_.YK9h6n96fZUd1anBSb4-1707623721-1-ARqYTKa5v1rr5l7JrAFKA49u9VkLLWN/ygS9dipgmq9IwZaQYqUA7FFB5lO/PaE3o9fwWKWw3jmNetqCryLSbPE= |
|
websitezone.co/ | Name: requestid Value: ef697f5003240bd705b19cd2a6dd32d1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
lp.cybeready.net
websitezone.co
2606:4700:20::681a:8e9
2606:4700:20::ac43:4af9
2606:4700::6811:190e
2a00:1450:4001:801::200a
2a00:1450:4001:830::2003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