share.dmca.gripe
Open in
urlscan Pro
2400:cb00:2048:1::681f:5f50
Malicious Activity!
Public Scan
Submission: On July 24 via manual from IN
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on July 14th 2018. Valid for: 6 months.
This is the only time share.dmca.gripe was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2400:cb00:204... 2400:cb00:2048:1::681f:5f50 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
4 | 2400:cb00:204... 2400:cb00:2048:1::6813:c697 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 2a04:4e42:1b:... 2a04:4e42:1b::393 | 54113 (FASTLY) (FASTLY - Fastly) | |
1 | 2a00:1450:400... 2a00:1450:4001:814::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
4 | 2400:cb00:204... 2400:cb00:2048:1::6812:7c90 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
14 | 7 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
share.dmca.gripe |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com | |
ajax.cloudflare.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
hackshit-jjgxlqddbv.now.sh |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
now.sh
hackshit-jjgxlqddbv.now.sh |
994 B |
4 |
cloudflare.com
cdnjs.cloudflare.com ajax.cloudflare.com |
177 KB |
2 |
gstatic.com
fonts.gstatic.com |
28 KB |
2 |
cloudinary.com
res.cloudinary.com |
2 KB |
1 |
googleapis.com
fonts.googleapis.com |
853 B |
1 |
dmca.gripe
share.dmca.gripe |
6 KB |
14 | 6 |
Domain | Requested by | |
---|---|---|
4 | hackshit-jjgxlqddbv.now.sh |
cdnjs.cloudflare.com
|
3 | cdnjs.cloudflare.com |
share.dmca.gripe
ajax.cloudflare.com |
2 | fonts.gstatic.com | |
2 | res.cloudinary.com |
share.dmca.gripe
|
1 | fonts.googleapis.com |
share.dmca.gripe
|
1 | ajax.cloudflare.com |
share.dmca.gripe
|
1 | share.dmca.gripe | |
14 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni237724.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-07-14 - 2019-01-20 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://share.dmca.gripe/FAerTjCJfwWTUzMZ.html
Frame ID: 4E081646C3239EC204C47DD3CF1B2144
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
Node.js (Programming Languages) ExpandDetected patterns
- env /^io$/i
Semantic-ui (Web Frameworks) Expand
Detected patterns
- html /(?:<div class="ui\s[^>]+">)/i
- html /(?:<link[^>]+semantic(?:\.css|\.min\.css)">)/i
Socket.io (JavaScript Frameworks) Expand
Detected patterns
- env /^io$/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://res.cloudinary.com/ovac/image/upload/c_scale,e_hue:80,w_200/v1493903802/download_gyaxfp.jpg HTTP 0
- https://res.cloudinary.com/ovac/image/upload/c_scale,e_hue:80,w_200/v1493903802/download_gyaxfp.jpg HTTP 0
- https://res.cloudinary.com/ovac/image/upload/c_scale,e_hue:80,w_200/v1493903802/download_gyaxfp.jpg HTTP 0
- https://res.cloudinary.com/ovac/image/upload/c_scale,e_hue:80,w_200/v1493903802/download_gyaxfp.jpg HTTP 0
- https://res.cloudinary.com/ovac/image/upload/c_scale,e_hue:80,w_200/v1493903802/download_gyaxfp.jpg
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
FAerTjCJfwWTUzMZ.html
share.dmca.gripe/ |
16 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
semantic.min.css
cdnjs.cloudflare.com/ajax/libs/semantic-ui/2.2.6/ |
532 KB 93 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
download_trlc1g.png
res.cloudinary.com/ovac/image/upload/c_scale,w_50/v1493903153/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
rocket-loader.min.js
ajax.cloudflare.com/cdn-cgi/scripts/4f936b58/cloudflare-static/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
socket.io.js
cdnjs.cloudflare.com/ajax/libs/socket.io/1.7.1/ |
207 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
166 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
download_gyaxfp.jpg
res.cloudinary.com/ovac/image/upload/c_scale,e_hue:80,w_200/v1493903802/ Redirect Chain
|
23 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
3 KB 853 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v14/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
S6u9w4BMUTPHh6UVSwiPGQ3q5d0.woff2
fonts.gstatic.com/s/lato/v14/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
/
hackshit-jjgxlqddbv.now.sh/socket.io/ |
101 B 617 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
/
hackshit-jjgxlqddbv.now.sh/socket.io/ |
37 B 160 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST S |
/
hackshit-jjgxlqddbv.now.sh/socket.io/ |
2 B 113 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
/
hackshit-jjgxlqddbv.now.sh/socket.io/ |
4 B 104 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Excel / PDF download (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| __cfQR function| io function| $ function| jQuery object| BigData object| socket1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.dmca.gripe/ | Name: __cfduid Value: d3da81b5004fb72be46952eb4a7ca5cd21532429100 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.cloudflare.com
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
hackshit-jjgxlqddbv.now.sh
res.cloudinary.com
share.dmca.gripe
2400:cb00:2048:1::6812:7c90
2400:cb00:2048:1::6813:c697
2400:cb00:2048:1::681f:5f50
2a00:1450:4001:814::200a
2a00:1450:4001:81d::2003
2a04:4e42:1b::393
0fbade78bbd7df1292d1ac6595dffb1cd06e05b2429cfd553ef5d79974c0b84d
15a40fe35e53194c9fd6a913328311375d4ca089fd09f3ad6d10a5f3238a9c75
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
52726fb580d6bffc46615863ddbf4c319524b5a68fb484be2972bdad4fd0310d
7900a6daf04859fef2501b2cf08851772deae586328d56d79a36e86c689851c5
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
85628e2617b9fd60a037fe882be541c053453da72104474482f927b96b0dc50e
88aec064ced76b8da2b9445d31da35b29dfc95dfc92777c3b52d39db718aa9d9
9e01cd9d5c99f2550fff5002f1b7fcc1402aa88b84f471214b032a7cde0f42b2
a235dfede6424d9334cb64f46399b850ea104a734adf38a3f5bda17ab9d9f2aa
a3b3c4f67bf2b44294215e2be76f12794e6b142edec201e199c93c38739f2bfc
a9a2f1dd042cb6f1eded53dc0a1c66ed8694fc093dc3520cdac1a541d615d474
b8f746d314f136e2c4b46be7b95055eeb727fbd500148ad5f786fe4652cae709
e00af8e003e12778b595d257720107558eaac26548e31015711cb701e39c34b0
e25b621f04decb67a3c3b1fa337db1d117da0fb4590d05324d8bf24acf6ddace
f52b1d9da25ece2ba4a1e6add1a4a2cf8ba9851b21c8d00dd6a6e02605ee2a99