divine-fire-196c.nc5ctekl.workers.dev
Open in
urlscan Pro
2606:4700:3030::6815:35f2
Malicious Activity!
Public Scan
Submission: On August 11 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on June 27th 2024. Valid for: 3 months.
This is the only time divine-fire-196c.nc5ctekl.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer) Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 2606:4700:303... 2606:4700:3030::6815:35f2 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700::68... 2606:4700::6812:1d13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
1 | () () | ||
1 | 2a00:1450:400... 2a00:1450:4001:811::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a00:1450:400... 2a00:1450:4001:80b::200e | 15169 (GOOGLE) (GOOGLE) | |
1 | 13.224.189.91 13.224.189.91 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6812:133e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3030::ac43:8b77 | () () | |
27 | 13 |
ASN13335 (CLOUDFLARENET, US)
divine-fire-196c.nc5ctekl.workers.dev |
ASN15169 (GOOGLE, US)
encrypted-tbn0.gstatic.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-189-91.fra2.r.cloudfront.net
media.istockphoto.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
workers.dev
1 redirects
divine-fire-196c.nc5ctekl.workers.dev |
3 MB |
3 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 3618 ka-f.fontawesome.com |
5 KB |
3 |
gstatic.com
encrypted-tbn0.gstatic.com |
11 KB |
3 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
83 KB |
3 |
codesandbox.io
codesandbox.io — Cisco Umbrella Rank: 209528 |
48 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1832 |
39 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 fonts.googleapis.com — Cisco Umbrella Rank: 110 |
31 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
7 KB |
1 |
istockphoto.com
media.istockphoto.com — Cisco Umbrella Rank: 37551 |
23 KB |
0 |
web.app
Failed
runn1rnl8xzmqeh0kvov.web.app Failed |
|
27 | 10 |
Domain | Requested by | |
---|---|---|
8 | divine-fire-196c.nc5ctekl.workers.dev |
1 redirects
divine-fire-196c.nc5ctekl.workers.dev
|
3 | encrypted-tbn0.gstatic.com |
divine-fire-196c.nc5ctekl.workers.dev
|
3 | code.jquery.com |
divine-fire-196c.nc5ctekl.workers.dev
|
3 | codesandbox.io |
divine-fire-196c.nc5ctekl.workers.dev
codesandbox.io |
2 | ka-f.fontawesome.com |
kit.fontawesome.com
|
2 | maxcdn.bootstrapcdn.com |
divine-fire-196c.nc5ctekl.workers.dev
|
1 | kit.fontawesome.com |
divine-fire-196c.nc5ctekl.workers.dev
|
1 | fonts.googleapis.com |
divine-fire-196c.nc5ctekl.workers.dev
|
1 | cdnjs.cloudflare.com |
divine-fire-196c.nc5ctekl.workers.dev
|
1 | media.istockphoto.com |
divine-fire-196c.nc5ctekl.workers.dev
|
1 | ajax.googleapis.com |
divine-fire-196c.nc5ctekl.workers.dev
|
0 | runn1rnl8xzmqeh0kvov.web.app Failed |
divine-fire-196c.nc5ctekl.workers.dev
|
27 | 12 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
nc5ctekl.workers.dev WE1 |
2024-06-27 - 2024-09-25 |
3 months | crt.sh |
codesandbox.io E6 |
2024-07-21 - 2024-10-19 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
media.gettyimages.com Amazon RSA 2048 M03 |
2024-01-11 - 2025-02-07 |
a year | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-07-31 - 2024-10-29 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-07-23 - 2024-10-21 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-07-30 - 2025-01-27 |
6 months | crt.sh |
ka-f.fontawesome.com WE1 |
2024-07-01 - 2024-09-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://divine-fire-196c.nc5ctekl.workers.dev/
Frame ID: 531DFFF3C284135C9ECDA092E46C472E
Requests: 29 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://divine-fire-196c.nc5ctekl.workers.dev/ Page URL
-
https://divine-fire-196c.nc5ctekl.workers.dev/cdn-cgi/phish-bypass?atok=hI51KQEhgV.6nEmLyOyU7o5R9hJ6qCO9BJ6B0L6UxOY-172336...
HTTP 301
https://divine-fire-196c.nc5ctekl.workers.dev/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://divine-fire-196c.nc5ctekl.workers.dev/ Page URL
-
https://divine-fire-196c.nc5ctekl.workers.dev/cdn-cgi/phish-bypass?atok=hI51KQEhgV.6nEmLyOyU7o5R9hJ6qCO9BJ6B0L6UxOY-1723360531-0.0.1.1-%2F
HTTP 301
https://divine-fire-196c.nc5ctekl.workers.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
divine-fire-196c.nc5ctekl.workers.dev/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
divine-fire-196c.nc5ctekl.workers.dev/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
divine-fire-196c.nc5ctekl.workers.dev/cdn-cgi/images/ |
452 B 634 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
divine-fire-196c.nc5ctekl.workers.dev/ |
5 MB 914 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
divine-fire-196c.nc5ctekl.workers.dev/ Redirect Chain
|
5 MB 914 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
sse-hooks.e15ace8ccace5398a721ffec81f121de.js
codesandbox.io/public/sse-hooks/ |
173 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
banner.d9cb10a38.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
code.jquery.com/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
watermark-button.eeb14a97b.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
phishing
codesandbox.io/api/v1/sandboxes/divine-fire-196c/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
e4e59576-ea53-40c5-81ac-d9fa66e660b8
https://divine-fire-196c.nc5ctekl.workers.dev/ |
4 MB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
divine-fire-196c.nc5ctekl.workers.dev/ |
5 MB 914 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
images
encrypted-tbn0.gstatic.com/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
images
encrypted-tbn0.gstatic.com/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email-marketing-icon-vector-graphics-vector-id1257404830
media.istockphoto.com/vectors/ |
23 KB 23 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
images
encrypted-tbn0.gstatic.com/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
422 B 731 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585b051251.js
kit.fontawesome.com/ |
13 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
hover.css
runn1rnl8xzmqeh0kvov.web.app/ucspqsuf8bxoiymvvdy5p6pp9uzvyqj/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
0 0 |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
0 0 |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
144 KB 0 |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- codesandbox.io
- URL
- https://codesandbox.io/api/v1/sandboxes/divine-fire-196c/phishing
- Domain
- runn1rnl8xzmqeh0kvov.web.app
- URL
- https://runn1rnl8xzmqeh0kvov.web.app/ucspqsuf8bxoiymvvdy5p6pp9uzvyqj/hover.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer) Generic Cloudflare (Online)162 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| s string| m function| $ function| jQuery object| FontAwesomeKitConfig function| Popper object| bootstrap function| IIii6y4cA56nC1o2nfu6se6iiii function| lLll6y4cA56nC1o2nfu6se6lii function| llii6y4ca56nc1o2nfu6se6iiii function| llll6y4ca56nc1o2nfu6se6iiii function| liii6y4ca56nc1o2nfu6se6iiii string| dIAI6j object| aBNK69 function| psiy9jo object| hVohuh3 number| GSp4GY object| _Q9Ki1H string| EKQo2I_ string| u3_weR string| y5xofK string| egHGm8 string| VDteBO string| Nja80jL string| MdHNTyf string| ZiSiMZ string| hBBupF2 string| Ov02XN string| _CjXrj string| XOIng0W string| LKYWQo0 string| mMFWdv string| V0cNJ6b string| D4GJxdf string| HPBkdfH string| DEWVqTh string| WMwTHb_ string| TxwkPif string| p8LZkmT string| TJ1iDTf string| tivjXiw string| zZ1MCk9 string| WB3aSJ string| Dw6EAF string| TURq5F0 string| htKxbJG string| jaaSGW string| RD9vK_F string| fGirIP string| h8RgdG8 string| xeY30fv string| xYRd9t string| RwHgOW string| GJurjO string| pSDhSnl string| WkjlxqU string| izolUI7 string| meK4Vb0 string| lkFbtE string| nj78wjW string| OzcQuJ string| Rzzd3W string| P_wMmt string| V1qvTb string| qjNqPeR string| JUoK0k string| DpoPhN string| f_HzmM string| Pm3SVn string| yt4hvQ string| NWLBqb string| fmtDSsc string| NLxi9hM string| gz18Qkw string| FyrpDqA string| SpCdOG string| rPui7K string| jP8QHFd string| wn2LL5 string| AGDtl_m string| Y61ga9o string| R7aUXib string| upuDlT string| usmnSN string| sBoictr string| iPM2Uhj string| ns8PPoJ object| cunJWfJ object| udjHVt object| t7ImJgK object| Bop1Lp8 function| diyDWo function| T5AQtF object| H_usPP number| Fqc1msY number| WufwUbK number| t15ZOcs number| xEwBba0 number| AOv3wJ2 function| sbKZB1k string| zF2xfT1 string| uCJwXI string| akgOLrZ string| tc1fnhC string| eEdFAxX string| sXz2Rf string| c6LeRg9 string| ozdGnAx string| wttQb4 string| pOuUjf string| QAnkvfn string| UR4lu76 string| ASPNhl string| iKMC0Pi string| KbojUnv string| JgL5Mb string| CoCueL string| wgBgef0 string| ir5Eo6 string| FTnV7X string| EZaMu6Y string| Pdsh3LD string| oIvfb_c string| cA0RKda string| irJmTFp string| eTD7aOT string| EYwpdD string| DQ0HkA string| R4e4Yw string| KS5zF3 string| UQKHIPn string| m7uRkSd string| V60RmJJ string| k8eKb_x string| aWZz99 string| tL3K1g6 string| iLKkMK string| JEwpdi string| czEfDY string| mv4hnRQ string| G_Kz1c string| fUleJr2 string| YfgUEo string| ZLGIuJ string| _zf1kR string| RSaG76x string| guuNCT2 string| FlRKXmj string| bBfYdc string| V8cc79 string| a8aKxxg string| JozxFfT string| LHIBJww function| Mq8mSix function| xf4PkP function| XWYnNNE function| vZWlgJW function| Q00o6P function| YCvfg5U function| WdKjuW2 function| S59GeL function| iiii6y4ca56nc1o2nfu6se6iiii2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.divine-fire-196c.nc5ctekl.workers.dev/ | Name: __cf_mw_byp Value: hI51KQEhgV.6nEmLyOyU7o5R9hJ6qCO9BJ6B0L6UxOY-1723360531-0.0.1.1-/ |
|
.codesandbox.io/ | Name: _cfuvid Value: 3M.B3u4QWeJnin6WZCct6ZzolaDenG1OqAjZYiEn7Zs-1723360545869-0.0.1.1-604800000 |
11 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
codesandbox.io
divine-fire-196c.nc5ctekl.workers.dev
encrypted-tbn0.gstatic.com
fonts.googleapis.com
ka-f.fontawesome.com
kit.fontawesome.com
maxcdn.bootstrapcdn.com
media.istockphoto.com
runn1rnl8xzmqeh0kvov.web.app
codesandbox.io
runn1rnl8xzmqeh0kvov.web.app
13.224.189.91
2606:4700:3030::6815:35f2
2606:4700:3030::ac43:8b77
2606:4700::6811:180e
2606:4700::6812:133e
2606:4700::6812:1d13
2606:4700::6812:bcf
2a00:1450:4001:803::200a
2a00:1450:4001:80b::200e
2a00:1450:4001:811::200a
2a04:4e42:400::649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