metamask.github.io Open in urlscan Pro
2606:50c0:8003::153  Malicious Activity! Public Scan

Submitted URL: http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Effective URL: https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Submission: On November 21 via manual from IN — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2606:50c0:8003::153, located in United States and belongs to FASTLY, US. The main domain is metamask.github.io. The Cisco Umbrella rank of the primary domain is 26611.
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on April 7th 2022. Valid for: a year.
This is the only time metamask.github.io was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Metamask (Crypto)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:50c0:800... 54113 (FASTLY)
1 2606:50c0:800... 54113 (FASTLY)
1 1
Apex Domain
Subdomains
Transfer
2 github.io
metamask.github.io — Cisco Umbrella Rank: 26611
13 KB
1 1
Domain Requested by
2 metamask.github.io 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
*.github.com
DigiCert TLS RSA SHA256 2020 CA1
2022-04-07 -
2023-04-07
a year crt.sh

This page contains 1 frames:

Primary Page: https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Frame ID: F7DD98D040C3423AA7A1681D098C2DA5
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js HTTP 301
    https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • ^https?://[^/]+\.github\.io

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

13 kB
Transfer

39 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js HTTP 301
    https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request lockdown-install.js
metamask.github.io/phishing-warning/v1.2.1/
Redirect Chain
  • http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
  • https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
39 KB
13 KB
Document
General
Full URL
https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8003::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
441218a51c55b14d1560d97d3a2f1358b5d7ef0e6b66a9bb695051ea7b5efe49

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
access-control-allow-origin
*
age
341
cache-control
max-age=600
content-encoding
gzip
content-length
12788
content-type
application/javascript; charset=utf-8
date
Mon, 21 Nov 2022 20:13:42 GMT
etag
W/"6374ec28-9c89"
expires
Mon, 21 Nov 2022 20:17:26 GMT
last-modified
Wed, 16 Nov 2022 13:56:56 GMT
permissions-policy
interest-cohort=()
server
GitHub.com
vary
Accept-Encoding
via
1.1 varnish
x-cache
HIT
x-cache-hits
4
x-fastly-request-id
e415c2fdcb63c369c775f09bd17a29f31b28b05b
x-github-request-id
1962:31A8:4C751C:4E12DE:637BDA7E
x-origin-cache
HIT
x-proxy-cache
HIT
x-served-by
cache-ams21052-AMS
x-timer
S1669061622.061600,VS0,VE1

Redirect headers

Accept-Ranges
bytes
Age
0
Connection
keep-alive
Content-Length
162
Content-Type
text/html
Date
Mon, 21 Nov 2022 20:13:41 GMT
Location
https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Server
GitHub.com
Vary
Accept-Encoding
Via
1.1 varnish
X-Cache
MISS
X-Cache-Hits
0
X-Fastly-Request-ID
3b132daa38449aaf3fc23c1f6e073f5289cf2a9e
X-GitHub-Request-Id
88F2:31A8:4D2C61:4ECEC2:637BDBF5
X-Served-By
cache-ams21022-AMS
X-Timer
S1669061622.850850,VS0,VE102
permissions-policy
interest-cohort=()

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Metamask (Crypto)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
security warning
Message:
Error with Permissions-Policy header: Origin trial controlled feature not enabled: 'interest-cohort'.

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

metamask.github.io
2606:50c0:8002::153
2606:50c0:8003::153
441218a51c55b14d1560d97d3a2f1358b5d7ef0e6b66a9bb695051ea7b5efe49