![](/screenshots/e1c8d58a-8238-427b-b247-679513a111d9.png)
f000.backblazeb2.com
Open in
urlscan Pro
104.153.233.177
Malicious Activity!
Public Scan
Effective URL: https://f000.backblazeb2.com/file/cooking-focus-a72ef077/index.html
Submission: On February 12 via manual from IN
Summary
TLS certificate: Issued by R3 on December 9th 2020. Valid for: 3 months.
This is the only time f000.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2620:101:2005... 2620:101:2005:11f0::1001 | 16417 (IRONPORT-...) (IRONPORT-SYSTEMS-INC) | |
1 2 | 208.109.21.16 208.109.21.16 | 398101 (GO-DADDY-...) (GO-DADDY-COM-LLC) | |
1 | 104.153.233.177 104.153.233.177 | 32354 (UNWIRED) (UNWIRED) | |
13 | 2606:4700:303... 2606:4700:3033::ac43:82ba | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 152.199.19.160 152.199.19.160 | 15133 (EDGECAST) (EDGECAST) | |
16 | 4 |
ASN398101 (GO-DADDY-COM-LLC, US)
PTR: ip-208-109-21-16.ip.secureserver.net
xtises.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
jupitersmt.com
jupitersmt.com |
1 MB |
2 |
xtises.com
1 redirects
xtises.com |
315 B |
1 |
aspnetcdn.com
ajax.aspnetcdn.com |
30 KB |
1 |
backblazeb2.com
f000.backblazeb2.com |
78 KB |
1 |
cisco.com
1 redirects
secure-web.cisco.com |
270 B |
16 | 5 |
Domain | Requested by | |
---|---|---|
13 | jupitersmt.com |
xtises.com
f000.backblazeb2.com |
2 | xtises.com | 1 redirects |
1 | ajax.aspnetcdn.com |
xtises.com
|
1 | f000.backblazeb2.com | |
1 | secure-web.cisco.com | 1 redirects |
16 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
xtises.com Go Daddy Secure Certificate Authority - G2 |
2021-02-12 - 2022-02-12 |
a year | crt.sh |
backblazeb2.com R3 |
2020-12-09 - 2021-03-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-01 - 2021-10-31 |
a year | crt.sh |
*.vo.msecnd.net DigiCert SHA2 Secure Server CA |
2020-11-16 - 2021-11-10 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f000.backblazeb2.com/file/cooking-focus-a72ef077/index.html
Frame ID: 38C788A4EB6D22D70E3E578E158B85B1
Requests: 16 HTTP requests in this frame
Screenshot
![](/screenshots/e1c8d58a-8238-427b-b247-679513a111d9.png)
Page URL History Show full URLs
-
https://secure-web.cisco.com/170Ui3x84H6mpiYTdAvQmvhRV25DI7kIkFXgvuobq7iU_7aIchfTdx8jL0W8Ynl3972JGfT8xWSK...
HTTP 302
https://xtises.com/ashares HTTP 301
https://xtises.com/ashares/ Page URL
- https://f000.backblazeb2.com/file/cooking-focus-a72ef077/index.html Page URL
Detected technologies
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://secure-web.cisco.com/170Ui3x84H6mpiYTdAvQmvhRV25DI7kIkFXgvuobq7iU_7aIchfTdx8jL0W8Ynl3972JGfT8xWSKyQ_-6SOJ7pjqnAuy73GliLAQ0fvg4TVb8WKHNOGQfj_eWJUDwVto0RRJvfrUsSyJBUoTHdB93n19Yku8W3HaS3nKzXJ5SMDwIM7q1UMyNB7U8yVB-R6m2x9c7Qs80xefBT3X_9-pAe_6cZae75rfZnjhqB1zpqL4bNNQNO_nrZScImm47cAcNNGa_teO0r3mvEgka7Xns3srWF3iyiDzABflHRPLR5x5tPLWj9tbee5gE5B4f0eIkCfnQ7YjhCFMeGN7IO11mtDSKO95Cscd6ahNpHzSiVcQnq2SWGlZC9qdpfnP3wq72d8QoC0e0roAFw_rf8WOPTpJCG3hox8gzL77yQZRqLVuhkqHe3dAAh8EIp-jJk0WumNvPanfTujOHqiHHLTYYK6WrRl78kTgE7E6DcjQmlqpENdZLVgx-R6pP4JWdTCWWFWvTQLsm9QGY-DYL_dlmPg/https%3A%2F%2Fxtises.com%2Fashares
HTTP 302
https://xtises.com/ashares HTTP 301
https://xtises.com/ashares/ Page URL
- https://f000.backblazeb2.com/file/cooking-focus-a72ef077/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://secure-web.cisco.com/170Ui3x84H6mpiYTdAvQmvhRV25DI7kIkFXgvuobq7iU_7aIchfTdx8jL0W8Ynl3972JGfT8xWSKyQ_-6SOJ7pjqnAuy73GliLAQ0fvg4TVb8WKHNOGQfj_eWJUDwVto0RRJvfrUsSyJBUoTHdB93n19Yku8W3HaS3nKzXJ5SMDwIM7q1UMyNB7U8yVB-R6m2x9c7Qs80xefBT3X_9-pAe_6cZae75rfZnjhqB1zpqL4bNNQNO_nrZScImm47cAcNNGa_teO0r3mvEgka7Xns3srWF3iyiDzABflHRPLR5x5tPLWj9tbee5gE5B4f0eIkCfnQ7YjhCFMeGN7IO11mtDSKO95Cscd6ahNpHzSiVcQnq2SWGlZC9qdpfnP3wq72d8QoC0e0roAFw_rf8WOPTpJCG3hox8gzL77yQZRqLVuhkqHe3dAAh8EIp-jJk0WumNvPanfTujOHqiHHLTYYK6WrRl78kTgE7E6DcjQmlqpENdZLVgx-R6pP4JWdTCWWFWvTQLsm9QGY-DYL_dlmPg/https%3A%2F%2Fxtises.com%2Fashares HTTP 302
- https://xtises.com/ashares HTTP 301
- https://xtises.com/ashares/
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
xtises.com/ashares/ Redirect Chain
|
114 B 217 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
f000.backblazeb2.com/file/cooking-focus-a72ef077/ |
77 KB 78 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
jupitersmt.com/email-list/sharepint6666/css-img/ |
156 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
ajax.aspnetcdn.com/ajax/jQuery/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
18 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
46 KB 47 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
jupitersmt.com/email-list/sharepint6666/css-img/ |
1 MB 1 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _0x823c function| _0x5717 object| Zlib function| updateImage function| $ function| jQuery function| mg function| randomInteger function| randomString function| getdomainpartofemail function| get_email_hash function| validateEmail function| geturlparameter function| get_rand_url_pars0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.aspnetcdn.com
f000.backblazeb2.com
jupitersmt.com
secure-web.cisco.com
xtises.com
104.153.233.177
152.199.19.160
208.109.21.16
2606:4700:3033::ac43:82ba
2620:101:2005:11f0::1001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