facebookvuess.pages.dev
Open in
urlscan Pro
2606:4700:310c::ac42:2f53
Malicious Activity!
Public Scan
Effective URL: https://facebookvuess.pages.dev/
Submission: On February 02 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by E1 on January 5th 2024. Valid for: 3 months.
This is the only time facebookvuess.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:310... 2606:4700:310c::ac42:2f53 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 38.51.188.245 38.51.188.245 | 272822 (JEMNETWORKS) (JEMNETWORKS) | |
1 | 162.159.134.232 162.159.134.232 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:50c0:800... 2606:50c0:8000::154 | 54113 (FASTLY) (FASTLY) | |
2 | 2606:4700:10:... 2606:4700:10::6816:4aab | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 6 |
ASN272822 (JEMNETWORKS, S.R.L., DO)
PTR: FTTH-fibraopticahastaelhogar-internetsimetrico-jementworks.net
mafiapanel.bio |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
amung.us
whos.amung.us — Cisco Umbrella Rank: 16645 |
48 B |
1 |
githubusercontent.com
raw.githubusercontent.com — Cisco Umbrella Rank: 4387 |
2 KB |
1 |
discordapp.net
media.discordapp.net — Cisco Umbrella Rank: 5975 |
223 KB |
1 |
mafiapanel.bio
mafiapanel.bio |
7 KB |
1 |
pages.dev
facebookvuess.pages.dev |
670 B |
0 |
Failed
function sub() { [native code] }. Failed |
|
7 | 6 |
Domain | Requested by | |
---|---|---|
2 | whos.amung.us |
facebookvuess.pages.dev
|
1 | raw.githubusercontent.com |
facebookvuess.pages.dev
|
1 | media.discordapp.net |
facebookvuess.pages.dev
|
1 | mafiapanel.bio |
facebookvuess.pages.dev
|
1 | facebookvuess.pages.dev | |
0 | 10.35.100.57 Failed |
facebookvuess.pages.dev
|
7 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
facebookvuess.pages.dev E1 |
2024-01-05 - 2024-04-04 |
3 months | crt.sh |
mafiapanel.bio R3 |
2023-12-07 - 2024-03-06 |
3 months | crt.sh |
discordapp.net Cloudflare Inc ECC CA-3 |
2023-09-03 - 2024-09-02 |
a year | crt.sh |
*.github.io DigiCert TLS RSA SHA256 2020 CA1 |
2023-02-21 - 2024-03-20 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-06-11 - 2024-06-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://facebookvuess.pages.dev/
Frame ID: 83B33E86ECEF74C19B65F34DE86196A5
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Melden Sie sich bei Ihrem Browser an, um Ihre Identität zu bestätigen und fortzufahrenPage URL History Show full URLs
-
http://facebookvuess.pages.dev/
HTTP 307
https://facebookvuess.pages.dev/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://facebookvuess.pages.dev/
HTTP 307
https://facebookvuess.pages.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
facebookvuess.pages.dev/ Redirect Chain
|
114 B 670 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.php
mafiapanel.bio/h/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sfsfsf.png
media.discordapp.net/attachments/1098938207317532795/1100778164176834610/ |
222 KB 223 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa.svg
raw.githubusercontent.com/busine011/icon/26aedd9c311c5392c5b6e4128793d5178245c7b5/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
380 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
1.mp4
10.35.100.57/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
547 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
552 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
177 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
515 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
242 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
18 B 18 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
30 B 30 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- 10.35.100.57
- URL
- http://10.35.100.57/1.mp4
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.discordapp.net/ | Name: __cfruid Value: 0801ce42712b0e8f48c99a88939203782d7ee5f1-1706836073 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
10.35.100.57
facebookvuess.pages.dev
mafiapanel.bio
media.discordapp.net
raw.githubusercontent.com
whos.amung.us
10.35.100.57
162.159.134.232
2606:4700:10::6816:4aab
2606:4700:310c::ac42:2f53
2606:50c0:8000::154
38.51.188.245
11ec04e3948e25a0d78d2f77c04940b8e38a086624ec36fa4605a2a69b133e94
1f4513a435d6a3047d20a50c1e7d4263de42146c74be227f774b5e82e6357e75
23f5a061ffa482dbaaf2ae4fac2f478b4cfb5b0e54f3bf7af8ad455ac4fc64b1
62f3f809487194fcc55a3ebd88811a604ae496027bb425d4ebd15d9ae1921945
717f6bb5f6cc69c444f54376a72dee0ca7968b2a12e7c9475247ec85c0e75a53
9531e96099e973b3d1c291f3e60419d8fe4730f46de8a492fccd2b4c962c96ce
9b53af0e6ee01d9d71d7c2082441915a80a4f05266d700377ba5d21aaba39309
d692a67352a3dfa80010c86a62761cfff05c0b1086618106a8576cc45a6a8115
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
eb14baeac955bb11e33cd7fd3fd2f698cf20db1b450325f45ea843b6cdc82366
ffc7356535080df814649a7d5fffd4126548fcc9957b4858dc3dedba64a76ff8