272m1.codesandbox.io
Open in
urlscan Pro
2606:4700::6812:16cf
Malicious Activity!
Public Scan
Effective URL: https://272m1.codesandbox.io/
Submission Tags: 6779058
Submission: On September 22 via api from NL
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 19th 2020. Valid for: a year.
This is the only time 272m1.codesandbox.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 47.246.48.224 47.246.48.224 | 24429 (TAOBAO Zh...) (TAOBAO Zhejiang Taobao Network Co.) | |
2 | 2606:4700::68... 2606:4700::6812:16cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3032::6818:7fb6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:17cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:5f41 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 67.202.94.94 67.202.94.94 | 32748 (STEADFAST) (STEADFAST) | |
6 | 6 |
ASN24429 (TAOBAO Zhejiang Taobao Network Co.,Ltd, CN)
r6a.cn |
ASN13335 (CLOUDFLARENET, US)
272m1.codesandbox.io | |
codesandbox.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
codesandbox.io
272m1.codesandbox.io codesandbox.io |
9 KB |
1 |
amung.us
whos.amung.us |
32 B |
1 |
cloudflareinsights.com
static.cloudflareinsights.com |
4 KB |
1 |
lsddmovies.xyz
lsddmovies.xyz |
16 KB |
1 |
r6a.cn
1 redirects
r6a.cn |
547 B |
6 | 5 |
Domain | Requested by | |
---|---|---|
2 | codesandbox.io |
272m1.codesandbox.io
|
1 | whos.amung.us |
272m1.codesandbox.io
|
1 | static.cloudflareinsights.com |
272m1.codesandbox.io
|
1 | lsddmovies.xyz |
272m1.codesandbox.io
|
1 | 272m1.codesandbox.io | |
1 | r6a.cn | 1 redirects |
6 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
codesandbox.io Cloudflare Inc ECC CA-3 |
2020-06-19 - 2021-06-19 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-07-09 - 2021-07-09 |
a year | crt.sh |
whos.amung.us Sectigo RSA Domain Validation Secure Server CA |
2020-05-21 - 2022-05-21 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://272m1.codesandbox.io/
Frame ID: 87243E6F437528E4A1A29A0050E17884
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://r6a.cn/gSjY
HTTP 302
https://272m1.codesandbox.io/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://r6a.cn/gSjY
HTTP 302
https://272m1.codesandbox.io/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
272m1.codesandbox.io/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.js
codesandbox.io/public/sse-hooks/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mk.js
lsddmovies.xyz/ |
76 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.b4f8ca2d6.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
beacon.min.js
static.cloudflareinsights.com/ |
10 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
512 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
160 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
32 B 32 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
875 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| bannedips string| ip object| handleips object| _0x47b6 function| _0x5510 function| _slicedToArray function| _nonIterableRest function| _unsupportedIterableToArray function| _arrayLikeToArray function| _iterableToArrayLimit function| _arrayWithHoles function| init function| _0x117a491 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.codesandbox.io/ | Name: __cfduid Value: d04d13c7b5f963f61397c950186f646031600776243 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
272m1.codesandbox.io
codesandbox.io
lsddmovies.xyz
r6a.cn
static.cloudflareinsights.com
whos.amung.us
2606:4700:3032::6818:7fb6
2606:4700::6810:5f41
2606:4700::6812:16cf
2606:4700::6812:17cf
47.246.48.224
67.202.94.94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