shiba-event.io
Open in
urlscan Pro
135.125.21.210
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On October 22 via api from FI — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 22nd 2021. Valid for: 3 months.
This is the only time shiba-event.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 135.125.21.210 135.125.21.210 | 16276 (OVH) (OVH) | |
3 | 104.18.22.52 104.18.22.52 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
18 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
shiba-event.io
shiba-event.io |
995 KB |
3 |
fontawesome.com
pro.fontawesome.com |
299 KB |
0 |
elite-hacks.ru
Failed
content.elite-hacks.ru Failed |
|
18 | 3 |
Domain | Requested by | |
---|---|---|
13 | shiba-event.io |
shiba-event.io
|
3 | pro.fontawesome.com |
shiba-event.io
pro.fontawesome.com |
0 | content.elite-hacks.ru Failed |
shiba-event.io
|
18 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
shiba-event.io R3 |
2021-10-22 - 2022-01-20 |
3 months | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2020-11-13 - 2021-12-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://shiba-event.io/shiba/
Frame ID: 1AE38F49BAF49015949B3A8B9C0064BC
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
SHIBA GiveawayDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
shiba-event.io/shiba/ |
24 KB 24 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aos.css
shiba-event.io/shiba/aos_2.3.1/dist/ |
25 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
pro.fontawesome.com/releases/v5.10.0/css/ |
153 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
shiba-event.io/shiba/dist/css/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
shiba-event.io/shiba/css/ |
548 B 831 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
shiba-event.io/shiba/images/content/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
person.png
shiba-event.io/shiba/images/content/ |
35 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
coin.png
shiba-event.io/shiba/images/content/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qr_code.png
shiba-event.io/shiba/images/content/ |
103 KB 103 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aos.js
shiba-event.io/shiba/aos_2.3.1/dist/ |
14 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.1.min.js
shiba-event.io/shiba/static/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
toast.min.js
shiba-event.io/shiba/static/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
shiba-event.io/shiba/js/ |
615 KB 615 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
analyze.php
content.elite-hacks.ru/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
501 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSansRegular.ttf
shiba-event.io/shiba/dist/fonts/ |
41 KB 41 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
pro.fontawesome.com/releases/v5.10.0/webfonts/ |
120 KB 120 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
pro.fontawesome.com/releases/v5.10.0/webfonts/ |
149 KB 149 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
analyze.php
content.elite-hacks.ru/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- content.elite-hacks.ru
- URL
- https://content.elite-hacks.ru/analyze.php
- Domain
- content.elite-hacks.ru
- URL
- https://content.elite-hacks.ru/analyze.php
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| AOS function| $ function| jQuery function| Toast object| xhttp_analyze function| CopyToClipboard object| scrollElem function| randomString function| randomStringHashBTC number| divCounter function| randomInteger function| randomIntegerBTC function| getRandomArbitrary function| getRundomMnogitel function| GenerateAddress function| GenerateHash function| genDiv number| rand0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
content.elite-hacks.ru
pro.fontawesome.com
shiba-event.io
content.elite-hacks.ru
104.18.22.52
135.125.21.210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