white-hat-bb54.tk75f2fk.workers.dev
Open in
urlscan Pro
104.21.60.14
Malicious Activity!
Public Scan
Submission: On December 16 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by GTS CA 1P5 on December 14th 2022. Valid for: 3 months.
This is the only time white-hat-bb54.tk75f2fk.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer) OneDrive (Online) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 104.21.60.14 104.21.60.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 104.18.6.114 104.18.6.114 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 69.16.175.42 69.16.175.42 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | () () | ||
1 | 172.253.118.95 172.253.118.95 | 15169 (GOOGLE) (GOOGLE) | |
2 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 74.125.24.95 74.125.24.95 | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.18.23.52 104.18.23.52 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
1 | 172.96.160.210 172.96.160.210 | 23470 (RELIABLESITE) (RELIABLESITE) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 172.64.168.22 172.64.168.22 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
19 | 13 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1467 ka-f.fontawesome.com — Cisco Umbrella Rank: 2554 |
22 KB |
3 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 686 |
84 KB |
3 |
codesandbox.io
codesandbox.io — Cisco Umbrella Rank: 79759 |
48 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 757 |
35 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 304 fonts.googleapis.com — Cisco Umbrella Rank: 37 |
31 KB |
2 |
workers.dev
white-hat-bb54.tk75f2fk.workers.dev |
679 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 211 |
7 KB |
1 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 12597 |
1 KB |
1 |
web.app
pastukalmau.web.app |
6 KB |
19 | 9 |
Domain | Requested by | |
---|---|---|
3 | code.jquery.com |
white-hat-bb54.tk75f2fk.workers.dev
|
3 | codesandbox.io |
white-hat-bb54.tk75f2fk.workers.dev
codesandbox.io |
2 | ka-f.fontawesome.com |
kit.fontawesome.com
|
2 | maxcdn.bootstrapcdn.com |
white-hat-bb54.tk75f2fk.workers.dev
|
2 | white-hat-bb54.tk75f2fk.workers.dev |
white-hat-bb54.tk75f2fk.workers.dev
|
1 | cdnjs.cloudflare.com |
white-hat-bb54.tk75f2fk.workers.dev
|
1 | i.ibb.co |
white-hat-bb54.tk75f2fk.workers.dev
|
1 | pastukalmau.web.app |
white-hat-bb54.tk75f2fk.workers.dev
|
1 | kit.fontawesome.com |
white-hat-bb54.tk75f2fk.workers.dev
|
1 | fonts.googleapis.com |
white-hat-bb54.tk75f2fk.workers.dev
|
1 | ajax.googleapis.com |
white-hat-bb54.tk75f2fk.workers.dev
|
19 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.tk75f2fk.workers.dev GTS CA 1P5 |
2022-12-14 - 2023-03-14 |
3 months | crt.sh |
*.nodebox.codesandbox.io E1 |
2022-11-10 - 2023-02-08 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-11-28 - 2023-02-20 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-11-22 - 2023-12-23 |
a year | crt.sh |
web.app GTS CA 1D4 |
2022-10-19 - 2023-01-17 |
3 months | crt.sh |
ibb.co R3 |
2022-12-08 - 2023-03-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://white-hat-bb54.tk75f2fk.workers.dev/
Frame ID: 48BECCA66C8323A42B5996304A65CF39
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
Share Point OnlineDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
white-hat-bb54.tk75f2fk.workers.dev/ |
4 MB 679 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.f742b80f43c5a2e0e619b0d97b5886cd.js
codesandbox.io/public/sse-hooks/ |
172 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.be879265d.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
code.jquery.com/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
phishing
codesandbox.io/api/v1/sandboxes/white-hat-bb54/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
watermark-button.be960f43b.js
codesandbox.io/static/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
8b0f579f-fd85-4fcc-a4e4-fc71f3ad7b05
https://white-hat-bb54.tk75f2fk.workers.dev/ |
3 MB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
398 B 816 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585b051251.js
kit.fontawesome.com/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boostyles.css
pastukalmau.web.app/ |
112 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gmail1.png
i.ibb.co/1Rvzzk8/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
59 KB 13 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
26 KB 4 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
30 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
771 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
157 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- codesandbox.io
- URL
- https://codesandbox.io/api/v1/sandboxes/white-hat-bb54/phishing
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer) OneDrive (Online) Generic (Online)133 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange string| s string| m function| $ function| jQuery object| FontAwesomeKitConfig string| _0xod8 number| _0xod8_ object| _0x31ed function| _0x3d69 string| _0xoda number| _0xoda_ object| _0x2a55 function| _0x293b string| _0xodS number| _0xodS_ object| _0x3011 function| _0x7eaa function| Popper object| bootstrap function| LLlLL6Y4ca56Nc1o2nfu6se6llll function| lLlL6Y4Ca56nC1o2nfu6se6lli function| llll6y4ca56nc1o2nfu6se6lli string| Bot6_UP object| PdsLDbW function| AGvaIzg object| qnWPbG number| LGT05Qy object| yFOZ_o string| H25MCg string| vuQ4Ts string| e2jkyH string| f0uUo9 string| Wp9a_tn string| NiGAHUn string| ERd9lDA string| C760Gcp string| gOwVRfL string| UYFNqd9 string| rmTgCr string| Q7TRoG6 string| WAUxZCe string| vLXGvym string| eCFiAsN string| qxGGsF string| GeQvVQk string| ffCJBLL string| IKICbNr string| mYEfxs string| Y7GAknM string| n29gqg3 string| xbcV0s string| aB11oOm string| Rw75dBQ string| AMg_zyy string| HtKm5hW string| rilg2v2 string| sOY6FE string| A4wset string| KYp4j_I string| toXiCM string| r27Yywa string| AF36PDs string| ZO2AL_B string| SGkrBb string| ndB95hZ string| NagVR37 string| siWDXJI string| rMbXdnv string| qMWY3A string| tMjEkSK string| TtInPwT string| s9OgVa7 string| W9QBLTC string| ziDu1wB string| dUvanU string| Lhqobs string| BRneO8V string| _rcf7r_ string| tjuk9Ih string| mdtljf string| EFgplx string| Z5JRXF2 string| qvgQO8B string| MRgzBvP string| hmOGYv string| PNlwnJS string| n8GoRL string| NtUr8vn string| Ebeb2JY string| XgmF731 string| xLtwPC string| LtMEUm string| VNxbMXX string| YFaClOQ string| ueKaV0 string| UCMzl0 string| R4puTZ string| bABaAxf string| lxG2VK string| SkMao6 string| qgUSc2P string| Ugos2ai string| l97DYAN string| WUj4IFG string| SjENmfe string| WJrJyfE string| D1xEmN string| oZq7Ln string| Xumtoty string| CjzjB07 string| nF8OWgT string| vAFBnns string| P1V34H string| XgdiYI object| KpBsfdQ object| cGUw1t object| WNkmal1 object| mrpdBHg function| UFG9DG function| GqYNyb undefined| XIVCPk7 function| llll6y4ca56nc1o2nfu6se6iii function| nDO0sdN function| llll6y4ca56nc1o2nfu6se6lii function| dsQWau_ function| tgibOvN function| U1uOGkg function| hUrsR1 function| zBfIfF function| PGRDT5M function| qBxC9c function| liii6y4ca56nc1o2nfu6se6iiii0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
11 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
codesandbox.io
fonts.googleapis.com
i.ibb.co
ka-f.fontawesome.com
kit.fontawesome.com
maxcdn.bootstrapcdn.com
pastukalmau.web.app
white-hat-bb54.tk75f2fk.workers.dev
codesandbox.io
104.17.25.14
104.18.10.207
104.18.23.52
104.18.6.114
104.21.60.14
172.253.118.95
172.64.168.22
172.96.160.210
199.36.158.100
69.16.175.42
74.125.24.95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