red-voice-cdb7.5u0zw1ww.workers.dev
Open in
urlscan Pro
172.67.171.148
Malicious Activity!
Public Scan
Effective URL: https://red-voice-cdb7.5u0zw1ww.workers.dev/
Submission: On August 19 via automatic, source openphish — Scanned from IT
Summary
TLS certificate: Issued by WE1 on July 30th 2024. Valid for: 3 months.
This is the only time red-voice-cdb7.5u0zw1ww.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online) Generic Email (Online) Generic (Online) Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 172.67.171.148 172.67.171.148 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 104.18.28.19 104.18.28.19 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 151.101.66.137 151.101.66.137 | 54113 (FASTLY) (FASTLY) | |
1 | () () | ||
11 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 142.250.185.170 142.250.185.170 | 15169 (GOOGLE) (GOOGLE) | |
28 | 9 |
ASN15169 (GOOGLE, US)
PTR: fra16s51-in-f10.1e100.net
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
web.app
mugahfntrcos.web.app |
178 KB |
7 |
workers.dev
1 redirects
red-voice-cdb7.5u0zw1ww.workers.dev |
952 KB |
3 |
codesandbox.io
codesandbox.io — Cisco Umbrella Rank: 209528 |
48 KB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
54 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 |
30 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1832 |
15 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
7 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
28 | 8 |
Domain | Requested by | |
---|---|---|
11 | mugahfntrcos.web.app |
red-voice-cdb7.5u0zw1ww.workers.dev
|
7 | red-voice-cdb7.5u0zw1ww.workers.dev |
1 redirects
red-voice-cdb7.5u0zw1ww.workers.dev
|
3 | codesandbox.io |
red-voice-cdb7.5u0zw1ww.workers.dev
codesandbox.io |
2 | code.jquery.com |
red-voice-cdb7.5u0zw1ww.workers.dev
|
1 | ajax.googleapis.com |
red-voice-cdb7.5u0zw1ww.workers.dev
|
1 | maxcdn.bootstrapcdn.com |
red-voice-cdb7.5u0zw1ww.workers.dev
|
1 | cdnjs.cloudflare.com |
red-voice-cdb7.5u0zw1ww.workers.dev
|
0 | scrapbook Failed |
red-voice-cdb7.5u0zw1ww.workers.dev
|
28 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
5u0zw1ww.workers.dev WE1 |
2024-07-30 - 2024-10-28 |
3 months | crt.sh |
codesandbox.io E6 |
2024-07-21 - 2024-10-19 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
web.app WR4 |
2024-07-26 - 2024-10-24 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-07-31 - 2024-10-29 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-07-23 - 2024-10-21 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://red-voice-cdb7.5u0zw1ww.workers.dev/
Frame ID: B36C48574DF8324B1289A9B4D97E11E5
Requests: 28 HTTP requests in this frame
Screenshot
Page Title
Share Point OnlinePage URL History Show full URLs
-
http://red-voice-cdb7.5u0zw1ww.workers.dev/
HTTP 307
https://red-voice-cdb7.5u0zw1ww.workers.dev/ Page URL
-
https://red-voice-cdb7.5u0zw1ww.workers.dev/cdn-cgi/phish-bypass?atok=6iUoB25WFfu.KYcw92v4f40YthQKJhoUW5GZkXtr0KI-172402...
HTTP 301
https://red-voice-cdb7.5u0zw1ww.workers.dev/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://red-voice-cdb7.5u0zw1ww.workers.dev/
HTTP 307
https://red-voice-cdb7.5u0zw1ww.workers.dev/ Page URL
-
https://red-voice-cdb7.5u0zw1ww.workers.dev/cdn-cgi/phish-bypass?atok=6iUoB25WFfu.KYcw92v4f40YthQKJhoUW5GZkXtr0KI-1724029499-0.0.1.1-%2F
HTTP 301
https://red-voice-cdb7.5u0zw1ww.workers.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://red-voice-cdb7.5u0zw1ww.workers.dev/ HTTP 307
- https://red-voice-cdb7.5u0zw1ww.workers.dev/
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
red-voice-cdb7.5u0zw1ww.workers.dev/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
red-voice-cdb7.5u0zw1ww.workers.dev/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
red-voice-cdb7.5u0zw1ww.workers.dev/cdn-cgi/images/ |
452 B 541 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
red-voice-cdb7.5u0zw1ww.workers.dev/ |
3 MB 472 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
red-voice-cdb7.5u0zw1ww.workers.dev/ Redirect Chain
|
3 MB 472 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.e15ace8ccace5398a721ffec81f121de.js
codesandbox.io/public/sse-hooks/ |
173 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.d9cb10a38.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
code.jquery.com/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.eeb14a97b.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
phishing
codesandbox.io/api/v1/sandboxes/red-voice-cdb7/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
7d2673b2-abe9-42c0-9f3e-aa2e78b71502
https://red-voice-cdb7.5u0zw1ww.workers.dev/ |
2 MB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
red-voice-cdb7.5u0zw1ww.workers.dev/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
mugahfntrcos.web.app/ |
140 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
mugahfntrcos.web.app/ |
885 B 418 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
hover.css
scrapbook:download:error:https://bafybeiheusk5n3szx42gyl63nn6pscjtktjv634ks6rp2mg7b3ewjg5dsq.ipfs.nftstorage.link/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
292d09fb0a8be4163b49f8756b9af48b3f6fc2d2.png
mugahfntrcos.web.app/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e9c4a10389fbaa3cd4c25a5d00dfae6060549f58.jpeg
mugahfntrcos.web.app/ |
61 KB 37 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
519096ad3f03410cf9ce3c9b9fcca6b439d97b23.png
mugahfntrcos.web.app/ |
771 B 880 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
17c27c038644bdb141381b606c7c94a177c07326.png
mugahfntrcos.web.app/ |
26 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cec15f6470d0237569e931d7d11752b41ac5d8a3.png
mugahfntrcos.web.app/ |
18 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
45a8b436d07d7ed7973b87a1c393d6973afe6fb5.png
mugahfntrcos.web.app/ |
18 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0e1c691f87cc4fa35c88344974f2829c40176b70.png
mugahfntrcos.web.app/ |
21 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d0a69c159304edc08db005163e7a0daf5a1e98a6.png
mugahfntrcos.web.app/ |
65 KB 56 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d5c7b5b8b5ce6484ba8871ba798c13cc1e73b078.jpeg
mugahfntrcos.web.app/ |
30 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- codesandbox.io
- URL
- https://codesandbox.io/api/v1/sandboxes/red-voice-cdb7/phishing
- Domain
- red-voice-cdb7.5u0zw1ww.workers.dev
- URL
- https://red-voice-cdb7.5u0zw1ww.workers.dev/favicon.ico
- Domain
- scrapbook
- URL
- urn:scrapbook:download:error:https://bafybeiheusk5n3szx42gyl63nn6pscjtktjv634ks6rp2mg7b3ewjg5dsq.ipfs.nftstorage.link/css/hover.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online) Generic Email (Online) Generic (Online) Generic Cloudflare (Online)144 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| s string| m function| $ function| jQuery function| Popper object| bootstrap function| llLL6y4ca56nC1o2nfu6se6iiii function| liii6y4ca56nc1o2nfu6se6iiii function| iIiI6y4ca56nC1o2nfu6se6iiii string| tfkBoZf object| w5K5ro function| b1aEhZt object| Ws39XZh number| F_pnou object| JiwVTpf string| Ar71lKG string| ulh1K1r string| LFc9xV string| d_p2x_A string| QTSatg string| SgwPad0 string| BNFsa9 string| V38hF4 string| LZ6WhH string| aOVu3xo string| Q6Q3Wd string| gjS8j07 string| GD3Cefz string| uOrv6dT string| RlvjY9X string| R7VWwl1 string| cSpx1R string| U9S_czA string| _Hmc3c string| L5C7MJh string| WwmyTVI string| nEqLmAt string| jCoUgMW string| irOAulF string| UUtXj2 string| NSSL8v string| JEcT29m string| lKJfke string| uq80CNC string| qFNyjxN string| _fbxy3 string| SfPqVa string| zpXS_bn string| RbKL4K string| uov272 string| wNFg87X string| lAbghV string| GJidpD string| Qf4VCw string| eAaJIQ string| afF0y6 string| DLob97Q string| _yiJr8 string| hzWkw_ string| bXb0zG string| gTU1Gx string| cnSSioO string| y3EYJa string| VIePOW string| wZnKcC string| CcBxA_i string| cAH9Hy string| HLN1FE string| U9DwuZ string| x1pRwsB string| jl7du2 string| EcTTcW string| QHFO4u string| bBxEPhc string| O8DGONW string| x500nJL string| aKd5_V2 string| xUoweqn object| Os6v_d object| bn_P2B object| QClGOxM object| WZxoyFY function| TEM1Qwp function| iiii6y4ca56nc1o2nfu6se6iiii function| llll6y4ca56nc1o2nfu6se6lii object| QtSTHW number| oorMWrI number| MWS4FQ number| JPTxCV number| H7Snnkx number| hAItJQ function| aYbqGh string| aXYe7Qj string| epS8Z0 string| SRzAvL string| _87ZEMF string| idJqUxY string| V2e9Jd string| c78uN4 string| y5efGDa string| QgdFUs string| IVaWhSM string| RzKkOiD string| eC_reS7 string| GQmfrm string| GrswTaK string| mazXSdZ string| VmHwUI string| B_YxsM string| O5mhvz string| TW2kvo string| PAcQ8Y string| qlAVsCY string| XwUZ4y string| g07wTC string| kUwdz4 string| DtQdtb string| DFVY79 string| cpq_ba string| W9aUza string| X5NeTyt string| YPi_jv string| TY3YUv string| iwcLPTV string| kOP_0S string| Du6ZkqG string| Qpi2tE string| bl7nCTz string| BUEHNKF string| aTN6oDL string| JDnIEk string| kw8qCY string| ucJGzLb string| taauz3 string| EYwruBr function| wCOcM8D function| GU6ovI function| rf9qGBG function| XsACe9N function| KATpss function| qgGz58Q function| jKbjN8 function| LOqcsQL function| lllll6y4ca56nc1o2nfu6se6llll2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.red-voice-cdb7.5u0zw1ww.workers.dev/ | Name: __cf_mw_byp Value: 6iUoB25WFfu.KYcw92v4f40YthQKJhoUW5GZkXtr0KI-1724029499-0.0.1.1-/ |
|
.codesandbox.io/ | Name: _cfuvid Value: ZsfyZ.hltNFlLEwHWFkC1C9LdVVCkXYq9O9Nd9KlDZQ-1724029503807-0.0.1.1-604800000 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
codesandbox.io
maxcdn.bootstrapcdn.com
mugahfntrcos.web.app
red-voice-cdb7.5u0zw1ww.workers.dev
scrapbook
codesandbox.io
red-voice-cdb7.5u0zw1ww.workers.dev
scrapbook
104.17.25.14
104.18.11.207
104.18.28.19
142.250.185.170
151.101.66.137
172.67.171.148
199.36.158.100
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
0ce87a38d1614591b28ddb556ce7cda9f8e88f5a638d3cce97c7c82496b9c451
1c9937bb6f9d154f49699393da35aaa6d5fb9218daa1ec4cba7b4ee097d0d65b
3a9b144d6482b78afc4e0a940a1d3c22240f14fa535b808cf4dab9635339569f
453dc3fd8b53c44d0cf63fa6bff94460c60ca674f43192e6b2d147b582a6a234
57898461712a639d119bdf88b7145919dcc8956c7a271d2e4a1084b29eae6785
5b1c0e1f78176fe1c432d5038c383b0bf467e15ee5cd122e871d85fc583d1f33
71020e37a4c15f51bf8379008061cef1a85b5c4be6ceb9f323cf4512ad04280c
71e729939e175f4ae9d3fcc645d6b7389ec341a47a84950e047197331fdc22f1
74850bad3411bc2540a6928159967088a555cb990e9569065a878e9e8a864830
7e5f0b99a980ce4fd3e8c027a5eb5edeed7ca416bfd1396b106332a735ad4821
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
aad24ed5f36320964c515b9889cb2943bbf830b40703999ad3976fce8176e554
acf087c1757f08b0cfd53d59066544d7ef0bfcc50999e77c5813739cd9dc1479
d5a6b16241b54c1029551db26820dd95a660e029d8d7231f874152bebb0356ca
d8b00afdb0a2ee57ce0d4897585830203c0091437cbb6797e06b4f704fcb4736
e391be8ca62b7a55870b9e5076c583e8c1618e09b6c4783a83ffd97410e01dd1
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
eb30ccb0c4d8275620947780d68c61f93849c86c6085f100a7744b83328ac482
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
f8a8cf4f1928938c796e2f35f8c21b0d510d4e3f16e016ee83d1f206f8ebde14