fe0q6.csb.app
Open in
urlscan Pro
2606:4700::6812:1b72
Malicious Activity!
Public Scan
Effective URL: https://fe0q6.csb.app/?fbclid=IwAR0Z4PIvFrUwb4-VlpvNqqChH12vkFk_B16LTC4btJm48RlrDwVERuQN2M8
Submission: On May 27 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on July 16th 2019. Valid for: a year.
This is the only time fe0q6.csb.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700::68... 2606:4700::6812:1b72 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6812:17cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 3 | 94.242.62.212 94.242.62.212 | 43317 (FISHNET-AS) (FISHNET-AS) | |
1 | 2606:4700:20:... 2606:4700:20::681a:64 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 2 | 67.202.94.86 67.202.94.86 | 32748 (STEADFAST) (STEADFAST) | |
2 | 185.225.208.133 185.225.208.133 | 13213 (UK2NET-AS) (UK2NET-AS) | |
8 | 6 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
amung.us
2 redirects
whos.amung.us widgets.amung.us |
3 KB |
3 |
svstorage.pw
1 redirects
svstorage.pw |
500 KB |
2 |
codesandbox.io
codesandbox.io |
8 KB |
1 |
geojs.io
get.geojs.io |
811 B |
1 |
csb.app
fe0q6.csb.app |
772 B |
8 | 5 |
Domain | Requested by | |
---|---|---|
3 | svstorage.pw |
1 redirects
fe0q6.csb.app
|
2 | widgets.amung.us | |
2 | whos.amung.us | 2 redirects |
2 | codesandbox.io |
fe0q6.csb.app
|
1 | get.geojs.io |
fe0q6.csb.app
|
1 | fe0q6.csb.app | |
8 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-07-16 - 2020-07-15 |
a year | crt.sh |
svstorage.pw cPanel, Inc. Certification Authority |
2020-05-12 - 2020-08-10 |
3 months | crt.sh |
whos.amung.us Sectigo RSA Domain Validation Secure Server CA |
2020-05-21 - 2022-05-21 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://fe0q6.csb.app/?fbclid=IwAR0Z4PIvFrUwb4-VlpvNqqChH12vkFk_B16LTC4btJm48RlrDwVERuQN2M8
Frame ID: C30836CC7CD0EAC5C83DDEA3323F05F1
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://fe0q6.csb.app/?fbclid=IwAR0Z4PIvFrUwb4-VlpvNqqChH12vkFk_B16LTC4btJm48RlrDwVERuQN2M8
HTTP 307
https://fe0q6.csb.app/?fbclid=IwAR0Z4PIvFrUwb4-VlpvNqqChH12vkFk_B16LTC4btJm48RlrDwVERuQN2M8 Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://fe0q6.csb.app/?fbclid=IwAR0Z4PIvFrUwb4-VlpvNqqChH12vkFk_B16LTC4btJm48RlrDwVERuQN2M8
HTTP 307
https://fe0q6.csb.app/?fbclid=IwAR0Z4PIvFrUwb4-VlpvNqqChH12vkFk_B16LTC4btJm48RlrDwVERuQN2M8 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://svstorage.pw/location HTTP 301
- https://svstorage.pw/location/
- https://whos.amung.us/widget/89syqnmriy HTTP 307
- https://widgets.amung.us/classic/00/8.png
- https://whos.amung.us/widget/petare5151 HTTP 307
- https://widgets.amung.us/classic/00/9.png
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
fe0q6.csb.app/ Redirect Chain
|
645 B 772 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.js
codesandbox.io/public/sse-hooks/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
svstorage.pw/ |
717 KB 499 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.b90db4dc7.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
svstorage.pw/location/ Redirect Chain
|
1 KB 508 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
geo.json
get.geojs.io/v1/ip/ |
304 B 811 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
widgets.amung.us/classic/00/ Redirect Chain
|
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9.png
widgets.amung.us/classic/00/ Redirect Chain
|
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
51 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| sh boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt object| to_object string| a function| checking function| creatingInput function| searchingForms0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
codesandbox.io
fe0q6.csb.app
get.geojs.io
svstorage.pw
whos.amung.us
widgets.amung.us
185.225.208.133
2606:4700:20::681a:64
2606:4700::6812:17cf
2606:4700::6812:1b72
67.202.94.86
94.242.62.212
0116feb7225a0bf4c4e415055c0e353a74f2bb2a39286e6e9c57639b420803c6
02b4eafc2aad23dd0155190b41acd1e8abe096f8b9c82a7d54cd1262beb42560
06c5958274df65e4ee016004a927d91e315b19b00094c01f5cc14ab7b0523376
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b
35c3241918d10a58523380f4097b02a6eea4e75bd33675b1ccd17cb72f112197
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f
9f8a51a3627d47f033bb3e8baee3ab6b74a07781b930a5204b1ede5f1975b55e
c1dc2cc26ca102520d01cf8e6e5404659d58f92c6c344b983a9cd68a983e5b72
ce0b3cc4048b5dd27f352533ac47cbdef8f4bb9a5170a7fa6d2a917428946599
d7e27379789840dffaa45d249dc2710738d55c0d95867618ac0d098ce4834fff