f002.backblazeb2.com
Open in
urlscan Pro
206.190.215.16
Malicious Activity!
Public Scan
Submission Tags: phishing
Submission: On September 13 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on July 19th 2021. Valid for: 3 months.
This is the only time f002.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 206.190.215.16 206.190.215.16 | 32354 (UNWIRED) (UNWIRED) | |
12 | 104.21.61.57 104.21.61.57 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 2 |
ASN32354 (UNWIRED, US)
PTR: f002.backblazeb2.com
f002.backblazeb2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
plutosmto.com
plutosmto.com |
244 KB |
2 |
backblazeb2.com
f002.backblazeb2.com |
76 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
12 | plutosmto.com |
f002.backblazeb2.com
|
2 | f002.backblazeb2.com |
f002.backblazeb2.com
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2021-07-19 - 2021-10-17 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-01 - 2021-10-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f002.backblazeb2.com/file/hypermysticalness-naggingness-praham/index.html
Frame ID: 8FB795D1BAD2CE1DC23CF61D9B76A661
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
f002.backblazeb2.com/file/hypermysticalness-naggingness-praham/ |
75 KB 75 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
plutosmto.com/email-list/dropboxcxcx22/img/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
10.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
12.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
plutosmto.com/email-list/dropboxcxcx22/img/ |
94 KB 95 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
f002.backblazeb2.com/file/hypermysticalness-naggingness-praham/img/ |
94 B 94 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| _0x55ae function| _0x1290 object| Zlib function| templatePage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
f002.backblazeb2.com
plutosmto.com
104.21.61.57
206.190.215.16
10954634b697781f7868941ae52e272f9b6b8817ddb45405d6713fd7496b85be
3724402e444447c43c55554b01a91204ab38314bec788e2458b7cad112bf614e
3d8e438c5f6a243fc8f81061dc2d00854fac5ad5b4cca87639d4095f29bc0129
414e7f5b3a30e7f608dd3838409092bf8dd47c19bbbaf32be3c235a14b5ea2e7
680af6669abc319f9803f0fa26d443df1b6bc29133d88a8e4bea560ffed7288c
73bfffb999b9979b23b7788d75c1e3f57d13c2ce6ed3729b7852b9a50eedcdd4
7641528292d5b3f033bc90e0f70757be629dd60092b63ab77d087a16745e6ef5
8127cbe16c69beb5ad909f0828b2435a734d759a169ee8b331a9ee39b53f7dfb
a51541c50e41e5e521bcfa4dd6175ad9f2f57287d1932c4ca8d9637007f078ff
a87ef7b2a413f234985afa048f77baf7911825ddda1a8b3610fecdd2c3093272
adfd07de1b4bbe23f8e4f7eedddc6fde432a2406f5487fd299a82d6616ff2779
bc7d62b5e732fd38160532e48780cb53fd0de4a7e85b2b24b914ebf10e074866
e20b9371531b230f9aed947f14294d4d5e88bda62332e9242609dee8cc0af66e
e71e76473b99fccdb728ad0c93cebc97129b379194439c00b95d99026d2f79df