csqv-raspy-ster-209d.vesma-egqmas.workers.dev
Open in
urlscan Pro
188.114.97.3
Malicious Activity!
Public Scan
Effective URL: https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/
Submission: On November 07 via api from DE — Scanned from NL
Summary
TLS certificate: Issued by WE1 on September 25th 2024. Valid for: 3 months.
This is the only time csqv-raspy-ster-209d.vesma-egqmas.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 188.114.97.3 188.114.97.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:440... 2606:4700:4400::6812:2844 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:828::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 192.158.231.86 192.158.231.86 | 397423 (TIER-NET) (TIER-NET) | |
3 | 172.67.139.119 172.67.139.119 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
18 | 7 |
ASN13335 (CLOUDFLARENET, US)
csqv-raspy-ster-209d.vesma-egqmas.workers.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
workers.dev
1 redirects
csqv-raspy-ster-209d.vesma-egqmas.workers.dev |
52 KB |
4 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1955 ka-f.fontawesome.com — Cisco Umbrella Rank: 5838 |
101 KB |
3 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3270 |
60 KB |
1 |
icons8.com
icons8.com — Cisco Umbrella Rank: 17773 |
20 KB |
1 |
googleapis.com
fonts.googleapis.com Failed ajax.googleapis.com — Cisco Umbrella Rank: 412 |
30 KB |
18 | 5 |
Domain | Requested by | |
---|---|---|
9 | csqv-raspy-ster-209d.vesma-egqmas.workers.dev |
1 redirects
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
|
3 | ka-f.fontawesome.com |
kit.fontawesome.com
|
3 | stackpath.bootstrapcdn.com |
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
|
1 | icons8.com |
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
|
1 | ajax.googleapis.com |
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
|
1 | kit.fontawesome.com |
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
|
0 | fonts.googleapis.com Failed |
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
|
18 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vesma-egqmas.workers.dev WE1 |
2024-09-25 - 2024-12-24 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-07-30 - 2025-01-27 |
6 months | crt.sh |
upload.video.google.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-09-20 - 2024-12-19 |
3 months | crt.sh |
*.icons8.com R11 |
2024-09-29 - 2024-12-28 |
3 months | crt.sh |
ka-f.fontawesome.com WE1 |
2024-10-27 - 2025-01-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/
Frame ID: 444D6F3976EC2736BC04C25A9B3712BB
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
Webmail Portal LoginPage URL History Show full URLs
-
http://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/
HTTP 307
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ Page URL
-
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/cdn-cgi/phish-bypass?atok=6UAbWcKTFbYPXDy8UgnkG5Xd1jWXDVj_cE1fBoDG9MA-173098...
HTTP 301
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/
HTTP 307
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ Page URL
-
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/cdn-cgi/phish-bypass?atok=6UAbWcKTFbYPXDy8UgnkG5Xd1jWXDVj_cE1fBoDG9MA-1730985138-0.0.1.1-%2F
HTTP 301
https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ HTTP 307
- https://csqv-raspy-ster-209d.vesma-egqmas.workers.dev/
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/cdn-cgi/images/ |
452 B 634 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ |
26 KB 9 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ Redirect Chain
|
26 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-1.js
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ |
26 KB 9 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ |
26 KB 9 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585b051251.js
kit.fontawesome.com/ |
13 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Circles-menu-3.gif
icons8.com/preloaders/preloaders/1484/ |
20 KB 20 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/ |
59 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
59 KB 13 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
26 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ |
26 KB 9 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-fa-solid-900.woff2
ka-f.fontawesome.com/releases/v5.15.4/webfonts/ |
76 KB 77 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.googleapis.com
- URL
- https://fonts.googleapis.com/css?family=Yellowtail%26display=swap
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| FontAwesomeKitConfig function| $ function| jQuery object| bootstrap function| _0x1dc3fd function| _0x20c4 function| _0x4ee91 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.csqv-raspy-ster-209d.vesma-egqmas.workers.dev/ | Name: __cf_mw_byp Value: 6UAbWcKTFbYPXDy8UgnkG5Xd1jWXDVj_cE1fBoDG9MA-1730985138-0.0.1.1-/ |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
csqv-raspy-ster-209d.vesma-egqmas.workers.dev
fonts.googleapis.com
icons8.com
ka-f.fontawesome.com
kit.fontawesome.com
stackpath.bootstrapcdn.com
fonts.googleapis.com
104.18.11.207
172.67.139.119
188.114.97.3
192.158.231.86
2606:4700:4400::6812:2844
2a00:1450:4001:828::200a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