f004.backblazeb2.com
Open in
urlscan Pro
149.137.128.16
Malicious Activity!
Public Scan
Effective URL: https://f004.backblazeb2.com/file/bludging-phyllodia-presbyteria/index.html
Submission: On February 18 via automatic, source openphish — Scanned from US
Summary
TLS certificate: Issued by R3 on February 8th 2022. Valid for: 3 months.
This is the only time f004.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 169.46.118.100 169.46.118.100 | 36351 (SOFTLAYER) (SOFTLAYER) | |
2 | 2607:f8b0:400... 2607:f8b0:4006:824::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3035::6815:2a46 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 149.137.128.16 149.137.128.16 | 40401 (BACKBLAZE) (BACKBLAZE) | |
9 | 2606:4700:303... 2606:4700:3034::6815:189e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
20 | 6 |
ASN36351 (SOFTLAYER, US)
PTR: 64.76.2ea9.ip4.static.sl-reverse.com
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net |
ASN40401 (BACKBLAZE, US)
PTR: f004.backblazeb2.com
f004.backblazeb2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
gohardsmtp.com
gohardsmtp.com |
240 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 250 |
61 KB |
1 |
backblazeb2.com
f004.backblazeb2.com |
77 KB |
1 |
discoversmtp.com
discoversmtp.com — Cisco Umbrella Rank: 629372 |
616 B |
1 |
softlayer.net
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net |
75 KB |
20 | 5 |
Domain | Requested by | |
---|---|---|
9 | gohardsmtp.com |
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net
f004.backblazeb2.com |
2 | ajax.googleapis.com |
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net
|
1 | f004.backblazeb2.com |
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net
|
1 | discoversmtp.com |
ajax.googleapis.com
|
1 | 1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net | |
20 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-28 - 2023-01-28 |
a year | crt.sh |
backblazeb2.com R3 |
2022-02-08 - 2022-05-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://f004.backblazeb2.com/file/bludging-phyllodia-presbyteria/index.html
Frame ID: 1AD27B11DEDF910B7AAEDB44302FA51F
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
Office 365Page URL History Show full URLs
- http://1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net/viperously/index.html?key=8c2356b5a3d23344dfe7f2c1f781db3d&redirect=https:/w... Page URL
- https://f004.backblazeb2.com/file/bludging-phyllodia-presbyteria/index.html Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net/viperously/index.html?key=8c2356b5a3d23344dfe7f2c1f781db3d&redirect=https:/www.amazon.com Page URL
- https://f004.backblazeb2.com/file/bludging-phyllodia-presbyteria/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.html
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net/viperously/ |
74 KB 75 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
redirect-to-url.php
discoversmtp.com/email-list/__vendor/ |
75 B 616 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
f004.backblazeb2.com/file/bludging-phyllodia-presbyteria/ |
77 KB 77 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
voice-message.svg
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
2 KB 949 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google.png
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
outlook.png
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Aol%20shape.png
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office.png
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yahoo.png
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
other%20mails.png
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
212 KB 212 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.woff2
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI.woff2
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI.woff
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.woff
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI.ttf
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.ttf
gohardsmtp.com/email-list/fdfhudfh2/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- gohardsmtp.com
- URL
- https://gohardsmtp.com/email-list/fdfhudfh2/assets/SegoeUI-SemiBold.woff2
- Domain
- gohardsmtp.com
- URL
- https://gohardsmtp.com/email-list/fdfhudfh2/assets/SegoeUI.woff2
- Domain
- gohardsmtp.com
- URL
- https://gohardsmtp.com/email-list/fdfhudfh2/assets/SegoeUI.woff
- Domain
- gohardsmtp.com
- URL
- https://gohardsmtp.com/email-list/fdfhudfh2/assets/SegoeUI-SemiBold.woff
- Domain
- gohardsmtp.com
- URL
- https://gohardsmtp.com/email-list/fdfhudfh2/assets/SegoeUI.ttf
- Domain
- gohardsmtp.com
- URL
- https://gohardsmtp.com/email-list/fdfhudfh2/assets/SegoeUI-SemiBold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| _0x1033 function| _0x33c4 object| Zlib function| templatePage function| $ function| jQuery function| window_opener_xc function| get_extra_data0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
16 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1qh3nz9xt6.s3.us-south.objectstorage.softlayer.net
ajax.googleapis.com
discoversmtp.com
f004.backblazeb2.com
gohardsmtp.com
gohardsmtp.com
149.137.128.16
169.46.118.100
2606:4700:3034::6815:189e
2606:4700:3035::6815:2a46
2607:f8b0:4006:824::200a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