frontier-yering-block-562e.vuguju.workers.dev
Open in
urlscan Pro
172.67.197.216
Malicious Activity!
Public Scan
Submission: On April 20 via api from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on April 20th 2024. Valid for: 3 months.
This is the only time frontier-yering-block-562e.vuguju.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Frontier (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 172.67.197.216 172.67.197.216 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 108.181.20.37 108.181.20.37 | 40676 (AS40676) (AS40676) | |
1 | 104.26.12.205 104.26.12.205 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 199.224.64.214 199.224.64.214 | 3593 (FRONTIER-...) (FRONTIER-EPIX) | |
15 | 5 |
ASN13335 (CLOUDFLARENET, US)
frontier-yering-block-562e.vuguju.workers.dev |
ASN3593 (FRONTIER-EPIX, US)
PTR: login.dlls.pa.frontiernet.net
login.frontier.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
catbox.moe
files.catbox.moe — Cisco Umbrella Rank: 197978 |
25 KB |
2 |
frontier.com
login.frontier.com — Cisco Umbrella Rank: 552900 |
2 KB |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2959 |
162 B |
1 |
workers.dev
frontier-yering-block-562e.vuguju.workers.dev |
195 KB |
15 | 4 |
Domain | Requested by | |
---|---|---|
5 | files.catbox.moe |
frontier-yering-block-562e.vuguju.workers.dev
files.catbox.moe |
2 | login.frontier.com | |
1 | api.ipify.org |
frontier-yering-block-562e.vuguju.workers.dev
|
1 | frontier-yering-block-562e.vuguju.workers.dev | |
15 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vuguju.workers.dev GTS CA 1P5 |
2024-04-20 - 2024-07-19 |
3 months | crt.sh |
catbox.moe R3 |
2024-02-29 - 2024-05-29 |
3 months | crt.sh |
ipify.org GTS CA 1P5 |
2024-03-21 - 2024-06-19 |
3 months | crt.sh |
*.frontier.com Entrust Certification Authority - L1K |
2023-06-20 - 2024-07-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://frontier-yering-block-562e.vuguju.workers.dev/
Frame ID: 054FE95B28E25FECC82EED53EE447613
Requests: 18 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
frontier-yering-block-562e.vuguju.workers.dev/ |
1 MB 195 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9f4xrp.css
files.catbox.moe/ |
119 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
05qpu8.css
files.catbox.moe/ |
5 KB 950 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9vias1.css
files.catbox.moe/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sir4zv.css
files.catbox.moe/ |
293 B 641 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ru69bf.css
files.catbox.moe/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
27 B 162 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.woff2
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.woff2
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.woff
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.woff
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.ttf
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.ttf
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.svg
login.frontier.com/ftr-sys-theme/img/ |
1 KB 2 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.svg
login.frontier.com/ftr-sys-theme/img/ |
1 KB 0 |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.woff2
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.woff2
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.woff
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.woff
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.ttf
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Frontier (Telecommunication)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| submit_login function| getIP0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
14 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.ipify.org
files.catbox.moe
frontier-yering-block-562e.vuguju.workers.dev
login.frontier.com
files.catbox.moe
104.26.12.205
108.181.20.37
172.67.197.216
199.224.64.214
08840c50d34bed078820ea796b47fb3bf3d9b69fbaf24c0ad23b380442013508
0a4f1c0678cd2a27ab20fa7efa25f37566d3fb652bd892621fb1deaa103c0119
2b1209efca8c946f91cb79ef1daee82cf8127fa7dda8ae5b9ecb05f1ce3b0a05
48725a65fda90b2073c17025dee946f69c9ba9a443a58f0f339e82945f2ccc5a
789d31b318ee1762a7ed926a52a4f57099365d126e2ce2774f531ad035bbfe98
90347f17d0a98b959d30b8803a1ccdeee8af9d60c7105f45562b8337ea444bb7
9deeb342bd2dfa32290046dbc4a27c66d475a49b0ed2c4f806a1f69750b658db
a88c997815e64df95cd98c340c54d773e79795d366f265e5ed436429227520a4
ab7421de979b4052e85d4bf17ff75d3861d652954790e889507d071675dde9e9
d21ec90f5fefe07186ca7a2fa307effbdd39b405e84c66b6be9c35e049c4ed2b
e3169af49b7168dac89aa10b6e0493ddd4fd5b95118578d51e86930a5cb89690