8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev Open in urlscan Pro
2606:4700:3036::6815:3fb7  Malicious Activity! Public Scan

URL: https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
Submission Tags: falconsandbox
Submission: On May 19 via api from US

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3036::6815:3fb7, located in United States and belongs to CLOUDFLARENET, US. The main domain is 8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev.
TLS certificate: Issued by R3 on May 11th 2021. Valid for: 3 months.
This is the only time 8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Adobe (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 2

This site contains no links.

Subject Issuer Validity Valid
*.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev
R3
2021-05-11 -
2021-08-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
Frame ID: 33B8021640F21AF0847A62326F05F651
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

120 kB
Transfer

292 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
188 KB
120 KB
Document
General
Full URL
https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6815:3fb7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
11aa7bb49495ad2205ff2d6116c949d1a40af70f1912a221d9d545aae0207798
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 19 May 2021 11:26:42 GMT
content-type
text/html; charset=utf-8
cf-ray
651cf8ce0fc7c2b8-FRA
age
75179
vary
Accept-Encoding
cf-cache-status
HIT
cf-request-id
0a25f9d4c20000c2b8129bc000000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
feature-policy
none
referrer-policy
unsafe-url
x-content-type-options
nosniff
x-frame-options
DENY
x-xss-protection
1; mode=block
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=P7dyfZwsx2cpS4Gf9%2FFJG1gvrjR8RU6wPRymDbOMIcgXqwZ7kqPcI00duMi7YZoFZA3zrq0I8io5Z%2BQxr7Fy%2FlqSvf5Mbv7EPyfJB1M0U3lvFtt4p7M4Try44VQ51gI%2BGDCFVDsqfwUDb4qGVlEzVPVx3kRNLaTbsz2fM9ZfnNY8AkZ7zy2LSdTDt%2BuEDg%3D%3D"}],"group":"cf-nel","max_age":604800}
nel
{"report_to":"cf-nel","max_age":604800}
server
cloudflare
content-encoding
br
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
truncated
/
86 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f1bd02d32bb72af0c6d749da0c33b531d02c6e789740e3d6023082ee4a920153

Request headers

Referer
https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3f8fc8a8b4fd2284c4b89bb0a54654a29f6195105e2224e210d95ffe08f1fb88

Request headers

Referer
https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
7 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b6f354299045fec095abfe8fd7780631ecbabb69ef0ab18405fc7b5d867917ef

Request headers

Referer
https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a9845715720434d45fb904d9614441ee83df6f306158caa829953739bb883fc5

Request headers

Referer
https://8712fu89309fhuf9u8.kylkgd-bqwf2109-f0913f093-1f09i309.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Adobe (Consumer)

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated string| s string| m

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block