69mmb0.csb.app
Open in
urlscan Pro
2606:4700::6812:703
Malicious Activity!
Public Scan
Submission: On April 05 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on January 30th 2023. Valid for: a year.
This is the only time 69mmb0.csb.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 2606:4700::68... 2606:4700::6812:703 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700::68... 2606:4700::6812:772 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:4d60 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 23.33.33.211 23.33.33.211 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 200.150.155.228 200.150.155.228 | 26592 (EQUINIX B...) (EQUINIX BRASIL) | |
12 | 6 |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-33-33-211.deploy.static.akamaitechnologies.com
http2.mlstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
csb.app
1 redirects
69mmb0.csb.app |
552 KB |
4 |
codesandbox.io
codesandbox.io — Cisco Umbrella Rank: 88773 |
49 KB |
1 |
ortobom.com.br
www.ortobom.com.br |
84 KB |
1 |
mlstatic.com
http2.mlstatic.com — Cisco Umbrella Rank: 18892 |
8 KB |
1 |
leroymerlin.com.br
cdn.leroymerlin.com.br — Cisco Umbrella Rank: 550942 |
7 KB |
12 | 5 |
Domain | Requested by | |
---|---|---|
6 | 69mmb0.csb.app |
1 redirects
69mmb0.csb.app
|
4 | codesandbox.io |
69mmb0.csb.app
codesandbox.io |
1 | www.ortobom.com.br |
69mmb0.csb.app
|
1 | http2.mlstatic.com |
69mmb0.csb.app
|
1 | cdn.leroymerlin.com.br |
69mmb0.csb.app
|
12 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.leroymerlin.com.br |
www.buscape.com.br |
www.americanas.com.br |
produto.mercadolivre.com.br |
www.magazineluiza.com.br |
www.ortobom.com.br |
Subject Issuer | Validity | Valid | |
---|---|---|---|
csb.app Cloudflare Inc ECC CA-3 |
2023-01-30 - 2024-01-29 |
a year | crt.sh |
*.sandpack-static-server.codesandbox.io R3 |
2023-03-31 - 2023-06-29 |
3 months | crt.sh |
*.leroymerlin.com.br GeoTrust RSA CA 2018 |
2022-10-10 - 2023-11-10 |
a year | crt.sh |
*.mlstatic.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-06 - 2023-06-08 |
a year | crt.sh |
*.ortobom.com.br AlphaSSL CA - SHA256 - G4 |
2023-03-22 - 2024-04-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://69mmb0.csb.app/
Frame ID: 58775368E5C794C5D4F336C8186114B4
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Busque pelo seu preçoPage URL History Show full URLs
- https://69mmb0.csb.app/ Page URL
-
https://69mmb0.csb.app/cdn-cgi/phish-bypass?atok=pvY_t53Itc13_d6J4mRjrp_3qyxG117yMO.D6bhTBNM-168069...
HTTP 301
https://69mmb0.csb.app/ Page URL
Page Statistics
9 Outgoing links
These are links going to different origins than the main page.
Title: Leroy Merlin: Clique Aqui!
Search URL Search Domain Scan URL
Title: BuscaPé: Clique Aqui!
Search URL Search Domain Scan URL
Title: Americanas: Clique Aqui!
Search URL Search Domain Scan URL
Title: Americanas: Clique Aqui!
Search URL Search Domain Scan URL
Title: Mercado Livre: Clique Aqui!
Search URL Search Domain Scan URL
Title: Magalu: Clique Aqui!
Search URL Search Domain Scan URL
Title: Ortobom: Clique Aqui!
Search URL Search Domain Scan URL
Title: Americanas: Clique Aqui!
Search URL Search Domain Scan URL
Title: Magalu: Clique Aqui!
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://69mmb0.csb.app/ Page URL
-
https://69mmb0.csb.app/cdn-cgi/phish-bypass?atok=pvY_t53Itc13_d6J4mRjrp_3qyxG117yMO.D6bhTBNM-1680699851-0-%2F
HTTP 301
https://69mmb0.csb.app/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
69mmb0.csb.app/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
69mmb0.csb.app/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
69mmb0.csb.app/cdn-cgi/images/ |
452 B 670 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
69mmb0.csb.app/ Redirect Chain
|
720 KB 543 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.f742b80f43c5a2e0e619b0d97b5886cd.js
codesandbox.io/public/sse-hooks/ |
172 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.0b5d84a2b.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
69mmb0.csb.app/ |
2 KB 951 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
phishing
codesandbox.io/api/v1/sandboxes/69mmb0/ |
33 B 498 B |
Fetch
application/vnd.github.v3+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
533 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ar_condicionado_split_9000btus_frio_220v_tcl_90991005_8cf3_300x300.jpg
cdn.leroymerlin.com.br/products/ |
7 KB 7 KB |
Image
image/avif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
D_NQ_NP_773591-MLB51716168313_092022-O.webp
http2.mlstatic.com/ |
6 KB 8 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Photo
www.ortobom.com.br/Content/ |
83 KB 84 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
watermark-button.f4f9aed52.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.69mmb0.csb.app/ | Name: __cf_mw_byp Value: pvY_t53Itc13_d6J4mRjrp_3qyxG117yMO.D6bhTBNM-1680699851-0-/ |
|
.codesandbox.io/ | Name: _cfuvid Value: exRVrE9o06LY2SHiBrARp4X43.FBj5R6_EZRdO12.DM-1680699857007-0-604800000 |
|
.leroymerlin.com.br/ | Name: __cf_bm Value: MPgtzfOmWDXb7JyVfj8LB.dGYC_Rw0JP8zimtjQNjUU-1680699858-0-AeGlzwR51VkVLNXLILDwGIVAAECdxZNQ3d8a0bE7SxyPueBIPxQp0knJj6Yy1+QMfY4FTQWhS7mEn4H6aadOXHs= |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
69mmb0.csb.app
cdn.leroymerlin.com.br
codesandbox.io
http2.mlstatic.com
www.ortobom.com.br
200.150.155.228
23.33.33.211
2606:4700::6811:4d60
2606:4700::6812:703
2606:4700::6812:772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