facebook.noiza.com
Open in
urlscan Pro
193.70.15.80
Public Scan
Submission Tags: @phishunt_io
Submission: On January 27 via api from ES
Summary
TLS certificate: Issued by R3 on January 26th 2021. Valid for: 3 months.
This is the only time facebook.noiza.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 193.70.15.80 193.70.15.80 | 16276 (OVH) (OVH) | |
5 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
noiza.com
facebook.noiza.com |
47 KB |
0 |
jquery.com
Failed
code.jquery.com Failed |
|
0 |
googleapis.com
Failed
fonts.googleapis.com Failed |
|
5 | 3 |
Domain | Requested by | |
---|---|---|
3 | facebook.noiza.com |
facebook.noiza.com
|
0 | code.jquery.com Failed |
facebook.noiza.com
|
0 | fonts.googleapis.com Failed |
facebook.noiza.com
|
5 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.noiza.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
facebook.noiza.com R3 |
2021-01-26 - 2021-04-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://facebook.noiza.com/
Frame ID: B0278D36E1A841236CD044D149A72A26
Requests: 5 HTTP requests in this frame
Screenshot
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: www.noiza.com
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
facebook.noiza.com/ |
1 KB 679 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
facebook.noiza.com/ |
392 B 589 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-latest.min.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb-noiza-home.png
facebook.noiza.com/ |
46 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.googleapis.com
- URL
- http://fonts.googleapis.com/css?family=Montserrat
- Domain
- code.jquery.com
- URL
- http://code.jquery.com/jquery-latest.min.js
Verdicts & Comments Add Verdict or Comment
9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
facebook.noiza.com
fonts.googleapis.com
code.jquery.com
fonts.googleapis.com
193.70.15.80
23ce5001573de756bb729e52283f6dcca2145f5e68080d9c384928eecd57b29e
75a45ce161b14b979483e02855412ab73d24f35b10dbeea9662ef9904ad310b2
d8e34191611f8f4414236fb572a4ca58a510addf503afb5bc3c2e30a531bf172