www.ethersmine.com
Open in
urlscan Pro
103.109.101.137
Malicious Activity!
Public Scan
Effective URL: https://www.ethersmine.com/wallet/metamask/
Submission: On October 12 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 2nd 2022. Valid for: 3 months.
This is the only time www.ethersmine.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Metamask (Crypto)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 103.109.101.137 103.109.101.137 | 206264 (AMARUTU-T...) (AMARUTU-TECHNOLOGY) | |
5 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ethersmine.com
1 redirects
www.ethersmine.com |
401 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
6 | www.ethersmine.com |
1 redirects
www.ethersmine.com
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ethersmine.com R3 |
2022-09-02 - 2022-12-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.ethersmine.com/wallet/metamask/
Frame ID: B78122F5182B1E392AF75743A0C4D1FD
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
MetaMaskPage URL History Show full URLs
-
http://www.ethersmine.com/wallet/metamask/
HTTP 301
https://www.ethersmine.com/wallet/metamask/ Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.ethersmine.com/wallet/metamask/
HTTP 301
https://www.ethersmine.com/wallet/metamask/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.ethersmine.com/wallet/metamask/ Redirect Chain
|
646 KB 136 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
www.ethersmine.com/wallet/metamask/fonts/Font_Awesome/ |
26 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
72 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
www.ethersmine.com/wallet/metamask/index_files/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EuclidCircularB-Regular-WebXL.ttf
www.ethersmine.com/wallet/metamask/fonts/Euclid/ |
151 KB 151 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fa-solid-900.woff2.html
www.ethersmine.com/wallet/metamask/fonts/Euclid/ |
78 KB 78 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Metamask (Crypto)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery number| id_user number| horaAtual string| campanha string| tela string| redin string| eth string| aparelho boolean| p0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.ethersmine.com
103.109.101.137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