f000.backblazeb2.com
Open in
urlscan Pro
104.153.233.177
Malicious Activity!
Public Scan
Effective URL: https://f000.backblazeb2.com/file/dragons-dream-fc11b938/index.html
Submission: On March 18 via manual from NZ
Summary
TLS certificate: Issued by R3 on February 17th 2021. Valid for: 3 months.
This is the only time f000.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 162.220.163.44 162.220.163.44 | 19318 (IS-AS-1) (IS-AS-1) | |
1 | 104.153.233.177 104.153.233.177 | 32354 (UNWIRED) (UNWIRED) | |
1 | 2a00:1450:400... 2a00:1450:4001:813::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 2606:4700:303... 2606:4700:3037::ac43:9afa | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 5 |
ASN19318 (IS-AS-1, US)
PTR: server.pakseoservice.com
wesolveassignments.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
laptopdata.xyz
laptopdata.xyz |
248 KB |
2 |
wesolveassignments.com
1 redirects
wesolveassignments.com |
615 B |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
backblazeb2.com
f000.backblazeb2.com |
78 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
7 | laptopdata.xyz |
wesolveassignments.com
f000.backblazeb2.com |
2 | wesolveassignments.com | 1 redirects |
1 | ajax.googleapis.com |
wesolveassignments.com
|
1 | f000.backblazeb2.com | |
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
wesolveassignments.com cPanel, Inc. Certification Authority |
2021-02-28 - 2021-05-29 |
3 months | crt.sh |
backblazeb2.com R3 |
2021-02-17 - 2021-05-18 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-02-23 - 2021-05-18 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-05 - 2022-03-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f000.backblazeb2.com/file/dragons-dream-fc11b938/index.html
Frame ID: F9BF6663B6B8644A69462086BA9019F7
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://wesolveassignments.com/shareds
HTTP 301
https://wesolveassignments.com/shareds/ Page URL
- https://f000.backblazeb2.com/file/dragons-dream-fc11b938/index.html Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://wesolveassignments.com/shareds
HTTP 301
https://wesolveassignments.com/shareds/ Page URL
- https://f000.backblazeb2.com/file/dragons-dream-fc11b938/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://wesolveassignments.com/shareds HTTP 301
- https://wesolveassignments.com/shareds/
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
wesolveassignments.com/shareds/ Redirect Chain
|
114 B 355 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
f000.backblazeb2.com/file/dragons-dream-fc11b938/ |
78 KB 78 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
left.png
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
206 KB 206 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
one-drive.svg
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
5 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-ms.svg
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
outlook.svg
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
1 KB 1000 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office.svg
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
1 KB 908 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
other.png
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.png
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
33 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.woff2
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.woff
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.ttf
laptopdata.xyz/email-list/arrrrrr2222/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- laptopdata.xyz
- URL
- https://laptopdata.xyz/email-list/arrrrrr2222/assets/SegoeUI-SemiBold.woff2
- Domain
- laptopdata.xyz
- URL
- https://laptopdata.xyz/email-list/arrrrrr2222/assets/SegoeUI-SemiBold.woff
- Domain
- laptopdata.xyz
- URL
- https://laptopdata.xyz/email-list/arrrrrr2222/assets/SegoeUI-SemiBold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _0x4751 function| _0x16b3 object| Zlib function| templatePage function| $ function| jQuery function| window_opener_xc function| get_extra_data0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
f000.backblazeb2.com
laptopdata.xyz
wesolveassignments.com
laptopdata.xyz
104.153.233.177
162.220.163.44
2606:4700:3037::ac43:9afa
2a00:1450:4001:813::200a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