metamask.github.io Open in urlscan Pro
2606:50c0:8000::153  Malicious Activity! Public Scan

Submitted URL: http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Effective URL: https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Submission: On November 15 via manual from IE — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2606:50c0:8000::153, located in United States and belongs to FASTLY, US. The main domain is metamask.github.io. The Cisco Umbrella rank of the primary domain is 26611.
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on April 7th 2022. Valid for: a year.
This is the only time metamask.github.io was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Metamask (Crypto)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:50c0:800... 54113 (FASTLY)
1 2606:50c0:800... 54113 (FASTLY)
1 1
Apex Domain
Subdomains
Transfer
2 github.io
metamask.github.io — Cisco Umbrella Rank: 26611
13 KB
1 1
Domain Requested by
2 metamask.github.io 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
*.github.com
DigiCert TLS RSA SHA256 2020 CA1
2022-04-07 -
2023-04-07
a year crt.sh

This page contains 1 frames:

Primary Page: https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Frame ID: FB068AD7C17F63464512651024662FA4
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js HTTP 301
    https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • ^https?://[^/]+\.github\.io

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

13 kB
Transfer

39 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js HTTP 301
    https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request lockdown-install.js
metamask.github.io/phishing-warning/v1.2.1/
Redirect Chain
  • http://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
  • https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
39 KB
13 KB
Document
General
Full URL
https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:50c0:8000::153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
GitHub.com /
Resource Hash
441218a51c55b14d1560d97d3a2f1358b5d7ef0e6b66a9bb695051ea7b5efe49

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
access-control-allow-origin
*
age
170
cache-control
max-age=600
content-encoding
gzip
content-length
12788
content-type
application/javascript; charset=utf-8
date
Tue, 15 Nov 2022 13:25:58 GMT
etag
W/"636a59b3-9c89"
expires
Mon, 14 Nov 2022 21:56:13 GMT
last-modified
Tue, 08 Nov 2022 13:29:23 GMT
permissions-policy
interest-cohort=()
server
GitHub.com
vary
Accept-Encoding
via
1.1 varnish
x-cache
HIT
x-cache-hits
4
x-fastly-request-id
a5e32b5b88b92da1aab56bd0688341533fbe74b5
x-github-request-id
6B10:9F1B:C2D79:C8444:6372BA4A
x-origin-cache
HIT
x-proxy-cache
HIT
x-served-by
cache-fra-eddf8230066-FRA
x-timer
S1668518759.797512,VS0,VE1

Redirect headers

Accept-Ranges
bytes
Age
0
Connection
keep-alive
Content-Length
162
Content-Type
text/html
Date
Tue, 15 Nov 2022 13:25:58 GMT
Location
https://metamask.github.io/phishing-warning/v1.2.1/lockdown-install.js
Server
GitHub.com
Vary
Accept-Encoding
Via
1.1 varnish
X-Cache
MISS
X-Cache-Hits
0
X-Fastly-Request-ID
74412c54373c9fcaac9cf5071c9178005321589e
X-GitHub-Request-Id
2BFE:101F2:5A6E1E:5D7110:63739366
X-Served-By
cache-fra-eddf8230123-FRA
X-Timer
S1668518759.671762,VS0,VE103
permissions-policy
interest-cohort=()

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Metamask (Crypto)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
security warning
Message:
Error with Permissions-Policy header: Origin trial controlled feature not enabled: 'interest-cohort'.

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

metamask.github.io
2606:50c0:8000::153
2606:50c0:8003::153
441218a51c55b14d1560d97d3a2f1358b5d7ef0e6b66a9bb695051ea7b5efe49