metamask-vulnerability-fix-v1.pages.dev
Open in
urlscan Pro
2606:4700:310c::ac42:2c34
Malicious Activity!
Public Scan
Effective URL: https://metamask-vulnerability-fix-v1.pages.dev/
Submission: On November 21 via automatic, source openphish — Scanned from GB
Summary
TLS certificate: Issued by WE1 on November 20th 2024. Valid for: 3 months.
This is the only time metamask-vulnerability-fix-v1.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 23 | 2606:4700:310... 2606:4700:310c::ac42:2c34 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a02:ec80:300... 2a02:ec80:300:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
2 | 2a00:1450:400... 2a00:1450:4001:813::2003 | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a04:4e42:200... 2a04:4e42:200::485 | 54113 (FASTLY) (FASTLY) | |
1 | 2a04:4e42:200... 2a04:4e42:200::649 | 54113 (FASTLY) (FASTLY) | |
31 | 7 |
ASN13335 (CLOUDFLARENET, US)
metamask-vulnerability-fix-v1.pages.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
pages.dev
1 redirects
metamask-vulnerability-fix-v1.pages.dev |
95 KB |
3 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 318 |
41 KB |
2 |
gstatic.com
fonts.gstatic.com |
36 KB |
2 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 3382 |
121 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 847 |
24 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 |
1 KB |
31 | 6 |
Domain | Requested by | |
---|---|---|
23 | metamask-vulnerability-fix-v1.pages.dev |
1 redirects
metamask-vulnerability-fix-v1.pages.dev
|
3 | cdn.jsdelivr.net |
metamask-vulnerability-fix-v1.pages.dev
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | upload.wikimedia.org |
metamask-vulnerability-fix-v1.pages.dev
|
1 | code.jquery.com |
metamask-vulnerability-fix-v1.pages.dev
|
1 | fonts.googleapis.com |
metamask-vulnerability-fix-v1.pages.dev
|
31 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
portfolio.metamask.io |
metamask.io |
Subject Issuer | Validity | Valid | |
---|---|---|---|
metamask-vulnerability-fix-v1.pages.dev WE1 |
2024-11-20 - 2025-02-18 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2024-09-26 - 2025-10-17 |
a year | crt.sh |
*.gstatic.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2024 Q3 |
2024-07-30 - 2025-08-31 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://metamask-vulnerability-fix-v1.pages.dev/
Frame ID: 640913FEBC436717B38AC27023ED3697
Requests: 32 HTTP requests in this frame
Screenshot
Page Title
MetaMask Revoke Hidden Authorised Spenders - DashboardPage URL History Show full URLs
-
http://metamask-vulnerability-fix-v1.pages.dev/
HTTP 307
https://metamask-vulnerability-fix-v1.pages.dev/ Page URL
-
https://metamask-vulnerability-fix-v1.pages.dev/cdn-cgi/phish-bypass?atok=uYY4JE8jmXKJes4yYTO7uefb2NSWrhFezz7g0oAuZ64-173215...
HTTP 301
https://metamask-vulnerability-fix-v1.pages.dev/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
10 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Tokens
Search URL Search Domain Scan URL
Title: NFTs
Search URL Search Domain Scan URL
Title: Dapps
Search URL Search Domain Scan URL
Title: Games
Search URL Search Domain Scan URL
Title: Terms of Use
Search URL Search Domain Scan URL
Title: Buy crypto
Search URL Search Domain Scan URL
Title: Send crypto
Search URL Search Domain Scan URL
Title: Stake crypto
Search URL Search Domain Scan URL
Title: Explore Web3
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://metamask-vulnerability-fix-v1.pages.dev/
HTTP 307
https://metamask-vulnerability-fix-v1.pages.dev/ Page URL
-
https://metamask-vulnerability-fix-v1.pages.dev/cdn-cgi/phish-bypass?atok=uYY4JE8jmXKJes4yYTO7uefb2NSWrhFezz7g0oAuZ64-1732151026-0.0.1.1-%2F
HTTP 301
https://metamask-vulnerability-fix-v1.pages.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://metamask-vulnerability-fix-v1.pages.dev/ HTTP 307
- https://metamask-vulnerability-fix-v1.pages.dev/
31 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
metamask-vulnerability-fix-v1.pages.dev/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
metamask-vulnerability-fix-v1.pages.dev/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
metamask-vulnerability-fix-v1.pages.dev/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
metamask-vulnerability-fix-v1.pages.dev/ |
4 KB 2 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
metamask-vulnerability-fix-v1.pages.dev/ Redirect Chain
|
317 KB 45 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1920px-MetaMask_Fox.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/3/36/MetaMask_Fox.svg/ |
120 KB 121 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
metamask-vulnerability-fix-v1.pages.dev/ |
4 KB 2 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
txttgas6
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index-Nk-kYmUM.js
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap-CttUg_Xb.css
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index-Dcvx4dd6.css
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/@popperjs/core@2.9.2/dist/umd/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/ |
59 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
metamask-vulnerability-fix-v1.pages.dev/dist/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1920px-MetaMask_Fox.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/3/36/MetaMask_Fox.svg/ |
120 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
portfolio-logo-CNpRgl_z.svg
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
portfolio-logo-dark-DAIDLfsH.svg
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
0x0000000000000000000000000000000000000000.png
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
nudge-8LKRr3VW.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
asset-1-CMLhKfTR.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
asset-2-ZIdp0zDI.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
explorer-iZjXy8TE.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
factory-D6AVobGP.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
swap-DNuskalE.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
stake-DLB21gVE.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
asset-3-BQ_6J0uO.webp
metamask-vulnerability-fix-v1.pages.dev/metamask_files/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| exploit function| $ function| jQuery object| Popper number| uidEvent object| bootstrap1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.metamask-vulnerability-fix-v1.pages.dev/ | Name: __cf_mw_byp Value: uYY4JE8jmXKJes4yYTO7uefb2NSWrhFezz7g0oAuZ64-1732151026-0.0.1.1-/ |
25 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
metamask-vulnerability-fix-v1.pages.dev
upload.wikimedia.org
2606:4700:310c::ac42:2c34
2a00:1450:4001:813::2003
2a00:1450:4001:829::200a
2a02:ec80:300:ed1a::2:b
2a04:4e42:200::485
2a04:4e42:200::649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