f003.backblazeb2.com
Open in
urlscan Pro
45.11.36.16
Malicious Activity!
Public Scan
Effective URL: https://f003.backblazeb2.com/file/beseeches-stores-zoisitization/index.html
Submission: On February 21 via manual from US — Scanned from US
Summary
TLS certificate: Issued by R3 on February 8th 2022. Valid for: 3 months.
This is the only time f003.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 169.46.118.100 169.46.118.100 | 36351 (SOFTLAYER) (SOFTLAYER) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:822::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3035::6815:2a46 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 45.11.36.16 45.11.36.16 | 40401 (BACKBLAZE) (BACKBLAZE) | |
12 | 104.21.47.206 104.21.47.206 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 5 |
ASN36351 (SOFTLAYER, US)
PTR: 64.76.2ea9.ip4.static.sl-reverse.com
et9io74qrl.s3.us-south.objectstorage.softlayer.net |
ASN40401 (BACKBLAZE, US)
PTR: f003.backblazeb2.com
f003.backblazeb2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
mashsmtp.com
mashsmtp.com |
277 KB |
1 |
backblazeb2.com
f003.backblazeb2.com — Cisco Umbrella Rank: 308893 |
76 KB |
1 |
discoversmtp.com
discoversmtp.com — Cisco Umbrella Rank: 629372 |
617 B |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 250 |
31 KB |
1 |
softlayer.net
et9io74qrl.s3.us-south.objectstorage.softlayer.net |
75 KB |
16 | 5 |
Domain | Requested by | |
---|---|---|
12 | mashsmtp.com |
et9io74qrl.s3.us-south.objectstorage.softlayer.net
|
1 | f003.backblazeb2.com |
et9io74qrl.s3.us-south.objectstorage.softlayer.net
|
1 | discoversmtp.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
et9io74qrl.s3.us-south.objectstorage.softlayer.net
|
1 | et9io74qrl.s3.us-south.objectstorage.softlayer.net | |
16 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.us-south.cloud-object-storage.appdomain.cloud DigiCert TLS RSA SHA256 2020 CA1 |
2021-11-09 - 2022-11-08 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-28 - 2023-01-28 |
a year | crt.sh |
backblazeb2.com R3 |
2022-02-08 - 2022-05-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://f003.backblazeb2.com/file/beseeches-stores-zoisitization/index.html
Frame ID: E1AD36BB074B46667500C604C072AD80
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
DropboxPage URL History Show full URLs
- https://et9io74qrl.s3.us-south.objectstorage.softlayer.net/fluted/index.html?key=c8d739d3d7d456ad8c338bf07d0c7127&redirect=https://www.... Page URL
- https://f003.backblazeb2.com/file/beseeches-stores-zoisitization/index.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://et9io74qrl.s3.us-south.objectstorage.softlayer.net/fluted/index.html?key=c8d739d3d7d456ad8c338bf07d0c7127&redirect=https://www.amazon.com Page URL
- https://f003.backblazeb2.com/file/beseeches-stores-zoisitization/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.html
et9io74qrl.s3.us-south.objectstorage.softlayer.net/fluted/ |
74 KB 75 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
redirect-to-url.php
discoversmtp.com/email-list/__vendor/ |
75 B 617 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
f003.backblazeb2.com/file/beseeches-stores-zoisitization/ |
76 KB 76 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
159 KB 160 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
10.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11.png
mashsmtp.com/email-list/dropboxxncbjh23/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| _0x368d function| _0x5b27 object| Zlib function| templatePage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
discoversmtp.com
et9io74qrl.s3.us-south.objectstorage.softlayer.net
f003.backblazeb2.com
mashsmtp.com
104.21.47.206
169.46.118.100
2606:4700:3035::6815:2a46
2607:f8b0:4006:822::200a
45.11.36.16
0f93308e8f3af63289c0972ebc19f91d538ab4133185e31eec655390cd231ed2
1215a1b8650a0d03e5cd0ad9875f4e3f6c32d681154bdc6d833b9d602252ec6e
186b638f0037a0e659e97edec8ecdbdc9e7a5e660cc1be4450554ad08624e915
1a22170e8689cac860ad634c2c585eeeffd8c79c8b559c9f61545728c5e0ada3
1d92bd03a325f5a9d527b2638a9fd7d94fb33f0233864b8a0dbc182c3ee198f3
2d7ced780fde2b5b5f6342bcd304263f5dce39c68ccdb674ebd7734e7881a77e
4095652f16e903b0ed845a041bf171a0776959effa0e038c514c65f905aa5a4c
5f3ab965b003703fcb8d9f83428fde9ada9815f4d691eb44a683a128f90e8b6c
680af6669abc319f9803f0fa26d443df1b6bc29133d88a8e4bea560ffed7288c
85e3612450762c0f2c359057df01a73bc25ea215f6cc5145e276228f190e4c88
9397bd0c11caf83acc01d7e9d0e2e00661bb950bad9af28d8b39f2b94c446790
a08340a4e6b2d640a445b9b6df23650371e3ab1c3f709da7e51577c39c27a85e
b2564e3ce7d7dc29b1f0e316c8b86c1f2bf8a6c65501d9ba9aa3fdc7da883f0b
f501d0dd8f333de6ddd7de2c4ff8c9e60b30a75ddb6f083f2131577cb0195f3b
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d