en.vivuni.workers.dev
Open in
urlscan Pro
2a06:98c1:3120::c
Malicious Activity!
Public Scan
Submission: On September 30 via api from CA — Scanned from NL
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on January 28th 2022. Valid for: a year.
This is the only time en.vivuni.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2a06:98c1:312... 2a06:98c1:3120::c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2620:0:862:ed... 2620:0:862:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
1 | 23.6.112.130 23.6.112.130 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
5 | 4 |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-6-112-130.deploy.static.akamaitechnologies.com
spoprod-a.akamaihd.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
workers.dev
en.vivuni.workers.dev |
9 KB |
1 |
akamaihd.net
spoprod-a.akamaihd.net — Cisco Umbrella Rank: 7142 |
967 B |
1 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 2121 |
23 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 284 |
30 KB |
5 | 4 |
Domain | Requested by | |
---|---|---|
2 | en.vivuni.workers.dev |
en.vivuni.workers.dev
|
1 | spoprod-a.akamaihd.net |
en.vivuni.workers.dev
|
1 | upload.wikimedia.org |
en.vivuni.workers.dev
|
1 | ajax.googleapis.com |
en.vivuni.workers.dev
|
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-28 - 2023-01-28 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-09-12 - 2022-12-05 |
3 months | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2021-10-19 - 2022-11-17 |
a year | crt.sh |
a248.e.akamai.net DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-28 - 2023-06-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://en.vivuni.workers.dev/indexx.html
Frame ID: 4AE4176659A5DCFE348EBC5F48347085
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
indexx.html
en.vivuni.workers.dev/ |
34 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1200px-Microsoft_logo_%282012%29.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/9/96/Microsoft_logo_%282012%29.svg/ |
21 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
folder.png
spoprod-a.akamaihd.net/files/fabric-cdn-prod_20210115.001/assets/item-types/32_2x/ |
444 B 967 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft-logo.png
en.vivuni.workers.dev/_layouts/15/images/ |
9 B 315 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
en.vivuni.workers.dev
spoprod-a.akamaihd.net
upload.wikimedia.org
23.6.112.130
2620:0:862:ed1a::2:b
2a00:1450:4001:801::200a
2a06:98c1:3120::c
6b6216a51356e958be8e220d552db01c3ffc7c95a24dc833f74cb20ada81b84d
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
d0b70f1041665c2abb648adc39c77b7a9f9806de2e4630e59eac725d3c8d3a8c
e302d91cdc5ea6c82c8ff2f491c7259aedb9912894da313043ee00c7f7d08eaa
f2f4485ba9fceb2926c0a541344eaf5ecdba5be4dbf75f823a73036224beebfb