worker-spring-voice-bc0c.eveliaherschelman904.workers.dev
Open in
urlscan Pro
172.67.208.166
Malicious Activity!
Public Scan
Effective URL: https://worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/
Submission: On August 23 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 8th 2024. Valid for: 3 months.
This is the only time worker-spring-voice-bc0c.eveliaherschelman904.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 172.67.208.166 172.67.208.166 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2 |
ASN13335 (CLOUDFLARENET, US)
worker-spring-voice-bc0c.eveliaherschelman904.workers.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
workers.dev
worker-spring-voice-bc0c.eveliaherschelman904.workers.dev |
69 KB |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | worker-spring-voice-bc0c.eveliaherschelman904.workers.dev | |
1 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
eveliaherschelman904.workers.dev WE1 |
2024-08-08 - 2024-11-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/
Frame ID: 7B36C13CE0DC711175CF14389A19BE9E
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Login ScreenPage URL History Show full URLs
-
http://worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/
HTTP 307
https://worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/
HTTP 307
https://worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
worker-spring-voice-bc0c.eveliaherschelman904.workers.dev/ Redirect Chain
|
253 KB 69 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
worker-spring-voice-bc0c.eveliaherschelman904.workers.dev
172.67.208.166
59ea63b5ffe0f060e37c24a44b6406943df9e4fca39e2ef43023c2ae9783f220
6982fbe858e30068de9301b49438c83838bc7beb058146703b22b701e6709c7e
bb9ee98294e830798a2e9b4adb368fe80cc4176dc01d4bfdb88ea845855544a5
e2740c7b209e33aca7176250d80f94b4924e5e5d18076ee3b95f32a0e20d1f58