hallebarde.com
Open in
urlscan Pro
43.135.10.199
Malicious Activity!
Public Scan
Effective URL: https://hallebarde.com/
Submission Tags: phishing amazon Search All
Submission: On August 18 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 9th 2023. Valid for: 3 months.
This is the only time hallebarde.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 172.67.140.105 172.67.140.105 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 43.135.10.199 43.135.10.199 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
9 | 3 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
hallebarde.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
hallebarde.com
hallebarde.com |
122 KB |
5 |
stafftechjobs.com
1 redirects
jjhubv.stafftechjobs.com |
8 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
5 | hallebarde.com |
jjhubv.stafftechjobs.com
hallebarde.com |
5 | jjhubv.stafftechjobs.com |
1 redirects
jjhubv.stafftechjobs.com
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
stafftechjobs.com GTS CA 1P5 |
2023-08-16 - 2023-11-14 |
3 months | crt.sh |
dexianglou.com R3 |
2023-08-09 - 2023-11-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://hallebarde.com/
Frame ID: 43D04B66899014659E6A8875597850A0
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Amazon | 本, ファッション, 家電から食品まで | アマゾンPage URL History Show full URLs
- https://jjhubv.stafftechjobs.com/caonigeomzfap Page URL
-
https://jjhubv.stafftechjobs.com/cdn-cgi/phish-bypass?atok=OHutnfEgZwxFI765E9i0LuKX0eLuO3QxJaQNqtAcaCs-169233...
HTTP 301
https://jjhubv.stafftechjobs.com/caonigeomzfap Page URL
- https://hallebarde.com/ Page URL
Detected technologies
Vuetify (UI frameworks) ExpandDetected patterns
- <div data-app[^>]+class="v-application
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://jjhubv.stafftechjobs.com/caonigeomzfap Page URL
-
https://jjhubv.stafftechjobs.com/cdn-cgi/phish-bypass?atok=OHutnfEgZwxFI765E9i0LuKX0eLuO3QxJaQNqtAcaCs-1692331955-0-%2Fcaonigeomzfap
HTTP 301
https://jjhubv.stafftechjobs.com/caonigeomzfap Page URL
- https://hallebarde.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://jjhubv.stafftechjobs.com/cdn-cgi/phish-bypass?atok=OHutnfEgZwxFI765E9i0LuKX0eLuO3QxJaQNqtAcaCs-1692331955-0-%2Fcaonigeomzfap HTTP 301
- https://jjhubv.stafftechjobs.com/caonigeomzfap
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
caonigeomzfap
jjhubv.stafftechjobs.com/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
jjhubv.stafftechjobs.com/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
jjhubv.stafftechjobs.com/cdn-cgi/images/ |
452 B 541 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
caonigeomzfap
jjhubv.stafftechjobs.com/ Redirect Chain
|
62 B 371 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
hallebarde.com/ |
27 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
hallebarde.com/static/japyamaxun/1/ |
12 KB 12 KB |
Stylesheet
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
materialdesignicons.min.css
hallebarde.com/static/japyamaxun/1/ |
326 KB 64 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.880b302c.css
hallebarde.com/static/japyamaxun/1/ |
284 KB 38 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.b48e5d48.css
hallebarde.com/static/japyamaxun/1/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.jjhubv.stafftechjobs.com/ | Name: __cf_mw_byp Value: OHutnfEgZwxFI765E9i0LuKX0eLuO3QxJaQNqtAcaCs-1692331955-0-/caonigeomzfap |
|
hallebarde.com/ | Name: think_lang Value: jp-jp |
|
hallebarde.com/ | Name: PHPSESSID Value: b1f5afb91e2c9a2abbb638a78a09ad0b |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hallebarde.com
jjhubv.stafftechjobs.com
172.67.140.105
43.135.10.199
10fe986d0c623ee3e1af02ec31a8f21fe90a99cefe9751e162acc7c14ba32ef3
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
446611327adb01390eb1937a404e9bf6ce05541af688a5c609cedc9abf39e72d
59a65b73431f20271cfd3d29a24ce135ac1ba4779849781256df1edff858a36f
91bf1028a832fff433bb9a68c6e440dee57e3ebbe8da798c8d8b7d5ee0e9fa38
a06c8df28fef078af9b0bd3527eae0aa706dfad73db4afa4e9fe89150832cacd
b345abe33a4f53c748b8b6858bbe2c0380add9fbbec748044d2e76d6f0bd681d
ba4172432768f0d219c30a24b12526827217d34efd45dad4132ac7dff4cc4c7f
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016