pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
Open in
urlscan Pro
2606:4700::6812:223
Malicious Activity!
Public Scan
Submission: On April 04 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by E1 on February 6th 2024. Valid for: 3 months.
This is the only time pub-d3987e70def6440692b7f7148ef48bc5.r2.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government) Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2606:4700::68... 2606:4700::6812:223 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
2 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a00:1450:400... 2a00:1450:4001:831::2003 | 15169 (GOOGLE) (GOOGLE) | |
17 | 7 |
ASN13335 (CLOUDFLARENET, US)
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev | |
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
r2.dev
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev |
490 KB |
3 |
gstatic.com
fonts.gstatic.com |
33 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1126 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2959 |
28 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 372 |
30 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 759 |
24 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 237 |
7 KB |
17 | 6 |
Domain | Requested by | |
---|---|---|
7 | pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev |
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev |
3 | fonts.gstatic.com |
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev
|
1 | stackpath.bootstrapcdn.com |
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
|
1 | ajax.googleapis.com |
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
|
1 | maxcdn.bootstrapcdn.com |
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
|
1 | code.jquery.com |
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
|
1 | cdnjs.cloudflare.com |
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
|
1 | pub-d3987e70def6440692b7f7148ef48bc5.r2.dev | |
17 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.r2.dev E1 |
2024-02-06 - 2024-05-06 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-03-04 - 2024-05-27 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2024-03-04 - 2024-05-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pub-d3987e70def6440692b7f7148ef48bc5.r2.dev/dangergov.html
Frame ID: 96B99EF64ABEDFD0692AA02882B21073
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Sign in with myGov - myGovDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Popper (Miscellaneous) Expand
Detected patterns
- <script [^>]*src="[^"]*/popper\.js/([0-9.]+)
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
dangergov.html
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev/ |
28 KB 29 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
16 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mgv2-application.css
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
123 KB 123 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blugov.css
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
69 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
load.gif
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
127 KB 127 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
myGov-cobranded-logo-black.svg
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
63 KB 63 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
myGov-cobranded-logo-white.svg
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
63 KB 63 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
icon-blugov-info.svg
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/icons/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v30/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v30/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v30/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon-at.png
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/ |
238 B 547 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev
- URL
- https://pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev/icons/icon-blugov-info.svg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government) Generic Email (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| PeTodSE function| Popper function| $ function| jQuery object| bootstrap string| f string| rc string| rdrt undefined| domain_redirect0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev
pub-d3987e70def6440692b7f7148ef48bc5.r2.dev
stackpath.bootstrapcdn.com
pub-84bcfd276ac046369fdd3c9a39c926d3.r2.dev
2606:4700::6811:180e
2606:4700::6812:223
2606:4700::6812:bcf
2a00:1450:4001:810::200a
2a00:1450:4001:831::2003
2a04:4e42:600::649
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0ee0fcba7f6a9b1a0885211bbb8fef101a825e56d6b2a9c2a71a37bfaec1862a
0f53e8b0a717ca4ce313eec62b90d41db62c2f4946259a65c93bf8e84c5b0c44
10b11a7c97b90bcf7ad520ac94c5769d08540ce1ee3b84d487c587bf128e3388
1afa12f8a7398c8d3fbfaaf0c7eddfc366d73c684b54b5f3f01af3465a00267f
4217794b756a7de5f436ce268788f5f5ec0d457fbba048d13aa6addf30135b14
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
5815d5ee03ac75272b80453c6aa196a47697b5c4aea7746b26b3de5a5acc29bb
5e70f30259d620e25efa88586a8871d5c94113f0b0d7d6f3e817f585891bf154
6b029a47a7bb72e8b70cf436b83d904b8a366fd360d12b4d8917c9f59e4b7d46
796de064b8d80eba7ccacb8ba67d77fdbcdf4b385c844645d452c24537b3108f
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
954aa858b3bffb8511bc41bc88b07d2b24597c37faf522550e26c9aa3b0d220d
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
bce2f309470952b7affa62ff4d91b454334c68cefa541429b502904d20696875
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b