brxwetrancm.pages.dev
Open in
urlscan Pro
2606:4700:310c::ac42:2f34
Malicious Activity!
Public Scan
Submission: On October 13 via api from TR — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on October 12th 2023. Valid for: 3 months.
This is the only time brxwetrancm.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:310... 2606:4700:310c::ac42:2f34 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2a06:f907:1:1... 2a06:f907:1:100:9000:9000:945d:5bf4 | 56630 (MELBICOM-...) (MELBICOM-EU-AS Melbikomas UAB) | |
9 | 2 |
ASN56630 (MELBICOM-EU-AS Melbikomas UAB, LT)
i.im.ge |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
im.ge
i.im.ge — Cisco Umbrella Rank: 218009 |
2 MB |
1 |
pages.dev
brxwetrancm.pages.dev |
7 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | i.im.ge |
brxwetrancm.pages.dev
|
1 | brxwetrancm.pages.dev | |
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
brxwetrancm.pages.dev GTS CA 1P5 |
2023-10-12 - 2024-01-10 |
3 months | crt.sh |
image.01.cdn.im.ge Sectigo RSA Domain Validation Secure Server CA |
2023-06-21 - 2024-06-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://brxwetrancm.pages.dev/
Frame ID: 07F835399B09A9436F66690F9D5752B3
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
brxwetrancm.pages.dev/ |
19 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiYvz8.background.jpg
i.im.ge/2023/08/07/ |
423 KB 423 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiby18.header.png
i.im.ge/2023/08/07/ |
582 KB 582 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiYpyX.logo.png
i.im.ge/2023/08/07/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiYk4K.xls-icon.png
i.im.ge/2023/08/07/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiY4mM.pdf-icon.png
i.im.ge/2023/08/07/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiYBWY.png-icon.png
i.im.ge/2023/08/07/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiZ7az.logo.png
i.im.ge/2023/08/07/ |
125 KB 126 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jiYnOh.header-2-bg.png
i.im.ge/2023/08/07/ |
768 KB 769 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| olafatob object| app0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
brxwetrancm.pages.dev
i.im.ge
2606:4700:310c::ac42:2f34
2a06:f907:1:100:9000:9000:945d:5bf4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