shop-llibre.com
Open in
urlscan Pro
172.67.189.110
Malicious Activity!
Public Scan
Submission: On December 11 via api from US — Scanned from IT
Summary
TLS certificate: Issued by WE1 on December 11th 2024. Valid for: 3 months.
This is the only time shop-llibre.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MercadoLibre (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 172.67.189.110 172.67.189.110 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 199.232.192.193 199.232.192.193 | 54113 (FASTLY) (FASTLY) | |
1 | 2.19.224.32 2.19.224.32 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
11 | 4 |
ASN16625 (AKAMAI-AS, US)
PTR: a2-19-224-32.deploy.static.akamaitechnologies.com
res.cloudinary.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
shop-llibre.com
1 redirects
shop-llibre.com |
10 KB |
4 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
49 KB |
1 |
cloudinary.com
res.cloudinary.com — Cisco Umbrella Rank: 2559 |
1 MB |
1 |
imgur.com
i.imgur.com — Cisco Umbrella Rank: 8961 |
205 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
6 | shop-llibre.com |
1 redirects
shop-llibre.com
|
4 | cdnjs.cloudflare.com |
shop-llibre.com
|
1 | res.cloudinary.com |
shop-llibre.com
|
1 | i.imgur.com |
shop-llibre.com
|
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
shop-llibre.com WE1 |
2024-12-11 - 2025-03-11 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-11-26 - 2025-02-24 |
3 months | crt.sh |
*.imgur.com Sectigo RSA Domain Validation Secure Server CA |
2024-02-15 - 2025-02-14 |
a year | crt.sh |
*.cloudinary.com Go Daddy Secure Certificate Authority - G2 |
2023-12-18 - 2025-01-13 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://shop-llibre.com/
Frame ID: 154B14C932A44019835A97E920CED623
Requests: 9 HTTP requests in this frame
Frame:
https://shop-llibre.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/f9063374b04d/main.js
Frame ID: 8CB092A280C2E5ECC3DB14E45FC0C1E9
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
SHOPDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Popper (Miscellaneous) Expand
Detected patterns
- <script [^>]*src="[^"]*/popper\.js/([0-9.]+)
- /popper\.js/([0-9.]+)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 6- https://shop-llibre.com/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://shop-llibre.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/f9063374b04d/main.js
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
shop-llibre.com/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/5.1.0/css/ |
159 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.4/css/ |
58 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
shop-llibre.com/css-js/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qTC7Dvr.png
i.imgur.com/ |
205 KB 205 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/2.9.2/umd/ |
18 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/5.1.0/js/ |
58 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
shop-llibre.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/f9063374b04d/ Frame 8CB0 Redirect Chain
|
9 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p0dysuq95vwnmresa2pt.jpg
res.cloudinary.com/dx1zztojj/image/upload/v1726204992/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
8f063373792018cf
shop-llibre.com/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame 8CB0 |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
shop-llibre.com/ |
445 B 810 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MercadoLibre (Consumer)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| Popper number| uidEvent object| bootstrap2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
shop-llibre.com/ | Name: s7b29b545 Value: 3hur8uqoqor2mjkjeoj1hmiim6 |
|
.shop-llibre.com/ | Name: cf_clearance Value: soJvcQxYdkkh_0Xw5oF8gNzvRXCIX3iXXVogemlOFtE-1733927725-1.2.1.1-0_KPLABhmYvLtORltIgKT.b15Di5Gv0nU8Nf_mlylpsjY.vNgz_9XssX7.xEf3IdkKR_Q445d9MfNk4JPgkNG2WTWW8BhocqN52VakBQ6O7cWeV4PzZCs8B5HYwEauHzhr4nft_Csg3XFzZhhcpNZbupziHZH8p4.iECyVufbsT3mgAn_egZrKCAYlcWrGufnxm0NbiljvVSqb2.4G.V4XR8r2cnFB81h38k2QxJdrzeHbPoYVaNHb7sgYJFT8Iv7czZ7PZeHeAC3DrDs31Bup3b8Q6YBzcptCCeROIeBT8Erk_HXEEzT1Sc01rC3FthWESUCgU.pEpi.ZFoV2FPmsX7qYGIaC4Xg0t0ln5N3a3jxXxWVNwHGxf1xNXCWIxf |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
i.imgur.com
res.cloudinary.com
shop-llibre.com
104.17.25.14
172.67.189.110
199.232.192.193
2.19.224.32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