floral-resonance-78c0.kurtifumla.workers.dev Open in urlscan Pro
2606:4700:3037::ac43:bcc8  Malicious Activity! Public Scan

URL: https://floral-resonance-78c0.kurtifumla.workers.dev/
Submission: On March 22 via automatic, source openphish — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2606:4700:3037::ac43:bcc8, located in United States and belongs to CLOUDFLARENET, US. The main domain is floral-resonance-78c0.kurtifumla.workers.dev.
TLS certificate: Issued by GTS CA 1P5 on March 19th 2024. Valid for: 3 months.
This is the only time floral-resonance-78c0.kurtifumla.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a02:6ea0:c70... 60068 (CDN77 _)
1 172.67.74.152 13335 (CLOUDFLAR...)
4 4
Apex Domain
Subdomains
Transfer
2 workers.dev
floral-resonance-78c0.kurtifumla.workers.dev
9 KB
1 ipify.org
api.ipify.org — Cisco Umbrella Rank: 2857
166 B
1 icons8.com
img.icons8.com — Cisco Umbrella Rank: 49760
2 KB
4 3
Domain Requested by
2 floral-resonance-78c0.kurtifumla.workers.dev floral-resonance-78c0.kurtifumla.workers.dev
1 api.ipify.org floral-resonance-78c0.kurtifumla.workers.dev
1 img.icons8.com floral-resonance-78c0.kurtifumla.workers.dev
4 3

This site contains no links.

Subject Issuer Validity Valid
kurtifumla.workers.dev
GTS CA 1P5
2024-03-19 -
2024-06-17
3 months crt.sh
1004834818.rsc.cdn77.org
R3
2024-02-04 -
2024-05-04
3 months crt.sh
ipify.org
GTS CA 1P5
2024-03-21 -
2024-06-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://floral-resonance-78c0.kurtifumla.workers.dev/
Frame ID: C71E2251BE82759BE649F9EC29B07A7E
Requests: 5 HTTP requests in this frame

Screenshot


Page Statistics

4
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

11 kB
Transfer

32 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
floral-resonance-78c0.kurtifumla.workers.dev/
15 KB
4 KB
Document
General
Full URL
https://floral-resonance-78c0.kurtifumla.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::ac43:bcc8 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e4fd74bf2121c14bb307aefb8549a5c9d427bada81b5001f057d3cfff78f27ba

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-ray
868674995b9e9294-CPH
content-encoding
br
content-type
text/html;charset=UTF-8
date
Fri, 22 Mar 2024 13:16:18 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ry%2BQMhQguJdaG%2B8rWvxmTEiSr1pMvJJVQa7U3L0Aw9%2Blm9P%2FNtvQCuUHgDCX%2BkDwH2wwR7SbHVPsUt6UEFcsVVjvJEpPYm9x5LBlHc%2BFg6Q%2Fkmgt5yZkQnqGfXgKX5m3aRj8X%2FgMT1x%2F0%2BCgwLAsdoFOnr6TKewcAqfnTo3Nhy1vfxGm1W6POLVjHA%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
style.css
floral-resonance-78c0.kurtifumla.workers.dev/
15 KB
4 KB
Stylesheet
General
Full URL
https://floral-resonance-78c0.kurtifumla.workers.dev/style.css
Requested by
Host: floral-resonance-78c0.kurtifumla.workers.dev
URL: https://floral-resonance-78c0.kurtifumla.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::ac43:bcc8 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e4fd74bf2121c14bb307aefb8549a5c9d427bada81b5001f057d3cfff78f27ba

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://floral-resonance-78c0.kurtifumla.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Fri, 22 Mar 2024 13:16:18 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VIPhb%2BB6vgpmbps%2FL%2BrpuYsdeU7djAJMhblYVSePgbO3lhAFrOmGqqeIh6QcapBIyCHvmvpF5%2BNUBjlztkKNsEHveWtpQ1PR29Q6R4HOpVkqLylH%2BITZdKIwWMU7gfK4LZbT9yf7gMs0mpTpkca5faW8N%2B0BeRdsYAg3c5KVKgLO8CNAEochLgBV3Q%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/html;charset=UTF-8
cf-ray
86867499bc8f9294-CPH
alt-svc
h3=":443"; ma=86400
google-logo.png
img.icons8.com/color/50/000000/
1 KB
2 KB
Image
General
Full URL
https://img.icons8.com/color/50/000000/google-logo.png
Requested by
Host: floral-resonance-78c0.kurtifumla.workers.dev
URL: https://floral-resonance-78c0.kurtifumla.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:6ea0:c700::11 Frankfurt am Main, Germany, ASN60068 (CDN77 _, GB),
Reverse DNS
Software
CDN77-Turbo /
Resource Hash
1a120e58f75551ccd9d96cdb3c285008a750de5c4eb18b66f2b036a588031955
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://floral-resonance-78c0.kurtifumla.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

x-77-pop
frankfurtDE
date
Fri, 22 Mar 2024 13:16:18 GMT
strict-transport-security
max-age=15724800; includeSubDomains
version
0.0.29
icon-format
png
x-77-cache
HIT
x-cache
HIT
x-age
259558
x-accel-date
1710853820
content-length
1335
x-77-nzt
EgwBw7WvJwH35vUDAAwB1GY4EQH33QIAAA
x-accel-expires
@1711155487
x-77-age
260291
not-found-platform
false
icon-size
50
last-modified
Tue, 19 Mar 2024 04:57:20
from-mongo-cache
true
server
CDN77-Turbo
x-77-nzt-ray
25b02131ad195974a284fd65c8f19937
vary
Origin
from-redis-cache
false
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=302400
accept-ranges
bytes
icon-id
17949
/
api.ipify.org/
31 B
166 B
Script
General
Full URL
https://api.ipify.org/?format=jsonp&callback=getIP
Requested by
Host: floral-resonance-78c0.kurtifumla.workers.dev
URL: https://floral-resonance-78c0.kurtifumla.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.74.152 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e1186c080e6a7e0a3e39010ede80c413f66d143f0e43dd5eb01581d7d2190b62

Request headers

Referer
https://floral-resonance-78c0.kurtifumla.workers.dev/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Fri, 22 Mar 2024 13:16:20 GMT
cf-cache-status
DYNAMIC
server
cloudflare
cf-ray
8686749a3df939ec-FRA
content-length
31
vary
Origin
content-type
application/javascript
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0fdefe26bac6a6b0b06fe67984582f887af70b7da25d6cb1b401f9074db58338

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Yahoo (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| getIP

0 Cookies

1 Console Messages

Source Level URL
Text
javascript warning URL: https://floral-resonance-78c0.kurtifumla.workers.dev/(Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://api.ipify.org/?format=jsonp&callback=getIP, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.