yhooomail.cepsumirzi.workers.dev Open in urlscan Pro
2606:4700:3034::6815:2f60  Malicious Activity! Public Scan

URL: https://yhooomail.cepsumirzi.workers.dev/
Submission: On June 17 via automatic, source openphish — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2606:4700:3034::6815:2f60, located in United States and belongs to CLOUDFLARENET, US. The main domain is yhooomail.cepsumirzi.workers.dev.
TLS certificate: Issued by GTS CA 1P5 on June 15th 2023. Valid for: 3 months.
This is the only time yhooomail.cepsumirzi.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a02:6ea0:c70... 60068 (CDN77 ^_^)
1 173.231.16.76 18450 (WEBNX)
4 4
Apex Domain
Subdomains
Transfer
2 workers.dev
yhooomail.cepsumirzi.workers.dev
9 KB
1 ipify.org
api.ipify.org — Cisco Umbrella Rank: 2448
107 B
1 icons8.com
img.icons8.com — Cisco Umbrella Rank: 34043
2 KB
4 3
Domain Requested by
2 yhooomail.cepsumirzi.workers.dev yhooomail.cepsumirzi.workers.dev
1 api.ipify.org yhooomail.cepsumirzi.workers.dev
1 img.icons8.com yhooomail.cepsumirzi.workers.dev
4 3

This site contains no links.

Subject Issuer Validity Valid
cepsumirzi.workers.dev
GTS CA 1P5
2023-06-15 -
2023-09-13
3 months crt.sh
1004834818.rsc.cdn77.org
R3
2023-04-29 -
2023-07-28
3 months crt.sh
*.ipify.org
Sectigo RSA Domain Validation Secure Server CA
2023-02-07 -
2024-02-18
a year crt.sh

This page contains 1 frames:

Primary Page: https://yhooomail.cepsumirzi.workers.dev/
Frame ID: 93D37DE5F7AD9C81686E2D36A091323D
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Yahoo

Page Statistics

4
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

11 kB
Transfer

32 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
yhooomail.cepsumirzi.workers.dev/
15 KB
4 KB
Document
General
Full URL
https://yhooomail.cepsumirzi.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6815:2f60 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e4fd74bf2121c14bb307aefb8549a5c9d427bada81b5001f057d3cfff78f27ba

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-ray
7d8a2d202c4837da-FRA
content-encoding
br
content-type
text/html;charset=UTF-8
date
Sat, 17 Jun 2023 09:13:23 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=OjvD51uQM0uvVtpHV4KHaz%2F9DFB4JL5PwlTjy4WeFTKW5vagGxATLGikcFprSY0ocqD5P%2F0FB6tlcWrqelk6gTpCh%2FWpWCLto3BziFvC9Ee7dsNFHODCVpHNE6C9VKsY6ZkJqGr8jRMjDQoiuZ2vqYilAKEzLildRYObnn%2BU%2FA%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
style.css
yhooomail.cepsumirzi.workers.dev/
15 KB
4 KB
Stylesheet
General
Full URL
https://yhooomail.cepsumirzi.workers.dev/style.css
Requested by
Host: yhooomail.cepsumirzi.workers.dev
URL: https://yhooomail.cepsumirzi.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6815:2f60 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e4fd74bf2121c14bb307aefb8549a5c9d427bada81b5001f057d3cfff78f27ba

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://yhooomail.cepsumirzi.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

date
Sat, 17 Jun 2023 09:13:23 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=dW4cdw%2BlXcgV43ApuhLhSkmUNvi%2Fszp5e1WItkwIHzIWoAmzTRhCakHtA3HBskMDSYAXfnkaTE7gL4U0pc7T%2Fkc9p1wum2tm%2Bw8H1qT0%2F2OP9f681obQazD2UsIQms0eB9j%2BWrQCy9i6LXMqDHMn6jANbBU0kn2JrkwiwlsYEw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/html;charset=UTF-8
cf-ray
7d8a2d206c8237da-FRA
alt-svc
h3=":443"; ma=86400
google-logo.png
img.icons8.com/color/50/000000/
1 KB
2 KB
Image
General
Full URL
https://img.icons8.com/color/50/000000/google-logo.png
Requested by
Host: yhooomail.cepsumirzi.workers.dev
URL: https://yhooomail.cepsumirzi.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:6ea0:c700::19 Frankfurt am Main, Germany, ASN60068 (CDN77 ^_^, GB),
Reverse DNS
Software
CDN77-Turbo /
Resource Hash
1a120e58f75551ccd9d96cdb3c285008a750de5c4eb18b66f2b036a588031955
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://yhooomail.cepsumirzi.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

x-77-pop
frankfurtDE
date
Sat, 17 Jun 2023 09:13:23 GMT
strict-transport-security
max-age=15724800; includeSubDomains
version
0.0.29
icon-format
png
x-cache
HIT
x-77-cache
HIT
x-age
59227
x-accel-date
1686933976
content-length
1335
x-77-nzt
AcO1qhGkWJP/W+cAAA
x-accel-expires
@1687236376
not-found-platform
false
icon-size
50
last-modified
Sat, 27 May 2023 21:47:27
from-mongo-cache
true
server
CDN77-Turbo
x-77-nzt-ray
4c156224002c65e233798d640ddcde12
vary
Origin
from-redis-cache
false
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=302400
accept-ranges
bytes
icon-id
17949
/
api.ipify.org/
32 B
107 B
Script
General
Full URL
https://api.ipify.org/?format=jsonp&callback=getIP
Requested by
Host: yhooomail.cepsumirzi.workers.dev
URL: https://yhooomail.cepsumirzi.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
173.231.16.76 , United States, ASN18450 (WEBNX, US),
Reverse DNS
173-231-16-76.static.webnx.com
Software
/
Resource Hash
febc5394dafba64aeb1060a3628d993ea31ec6419fb276961528a64a10efe038

Request headers

Referer
https://yhooomail.cepsumirzi.workers.dev/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Sat, 17 Jun 2023 09:13:24 GMT
content-length
32
vary
Origin
content-type
application/javascript
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0fdefe26bac6a6b0b06fe67984582f887af70b7da25d6cb1b401f9074db58338

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Yahoo (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend function| getIP

0 Cookies

1 Console Messages

Source Level URL
Text
javascript warning URL: https://yhooomail.cepsumirzi.workers.dev/(Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://api.ipify.org/?format=jsonp&callback=getIP, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.