nj7lw.csb.app
Open in
urlscan Pro
2606:4700:4400::ac40:9457
Malicious Activity!
Public Scan
Submission: On January 08 via api from IN — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on December 30th 2023. Valid for: a year.
This is the only time nj7lw.csb.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:440... 2606:4700:4400::ac40:9457 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700:440... 2606:4700:4400::ac40:9a6b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 142.44.241.213 142.44.241.213 | 16276 (OVH) (OVH) | |
2 4 | 2606:4700:10:... 2606:4700:10::ac43:88d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 5 |
ASN13335 (CLOUDFLARENET, US)
whos.amung.us | |
widgets.amung.us |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
amung.us
2 redirects
whos.amung.us — Cisco Umbrella Rank: 11176 widgets.amung.us — Cisco Umbrella Rank: 19555 |
3 KB |
4 |
codesandbox.io
codesandbox.io — Cisco Umbrella Rank: 223757 |
49 KB |
2 |
coro0.com
play.coro0.com |
717 KB |
1 |
csb.app
nj7lw.csb.app |
657 B |
9 | 4 |
Domain | Requested by | |
---|---|---|
4 | codesandbox.io |
nj7lw.csb.app
codesandbox.io |
2 | widgets.amung.us | |
2 | whos.amung.us | 2 redirects |
2 | play.coro0.com |
nj7lw.csb.app
|
1 | nj7lw.csb.app | |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
csb.app Cloudflare Inc ECC CA-3 |
2023-12-30 - 2024-12-29 |
a year | crt.sh |
codesandbox.io E1 |
2023-12-28 - 2024-03-27 |
3 months | crt.sh |
play.coro0.com cPanel, Inc. Certification Authority |
2023-12-20 - 2024-03-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://nj7lw.csb.app/wacth-video-216.98.226.19
Frame ID: 8416CDF39E3E48D7A52692601E715FA6
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://whos.amung.us/widget/luigi2020 HTTP 307
- https://widgets.amung.us/classic/00/3.png
- https://whos.amung.us/widget/cororico2020 HTTP 307
- https://widgets.amung.us/classic/00/3.png
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
wacth-video-216.98.226.19
nj7lw.csb.app/ |
805 B 657 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.350c89a8d06431c89209943b3882c89f.js
codesandbox.io/public/sse-hooks/ |
172 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.d9cb10a38.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
play.coro0.com/ |
716 KB 717 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.eeb14a97b.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phishing
codesandbox.io/api/v1/sandboxes/nj7lw/ |
33 B 401 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
location
play.coro0.com/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
widgets.amung.us/classic/00/ Redirect Chain
|
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
widgets.amung.us/classic/00/ Redirect Chain
|
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
51 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt undefined| to_object string| a1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.codesandbox.io/ | Name: _cfuvid Value: 17IZTr6eRNZWt7sLs1naP50Twi4WwqDaazALRD_wZJM-1704707142888-0-604800000 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
codesandbox.io
nj7lw.csb.app
play.coro0.com
whos.amung.us
widgets.amung.us
142.44.241.213
2606:4700:10::ac43:88d
2606:4700:4400::ac40:9457
2606:4700:4400::ac40:9a6b
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b
1c9937bb6f9d154f49699393da35aaa6d5fb9218daa1ec4cba7b4ee097d0d65b
2d91020394c232a07e303c0caff12346b174a759ed94de8bb0eac6c8b60e2660
59f17efc9fc32fc73c0451ed936286b0e690dc43282472a9d70ab785c68d4c98
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f
74850bad3411bc2540a6928159967088a555cb990e9569065a878e9e8a864830
a6c72f3efcab274e7cfe5c3980ac14365e62f46189c065684cef36bf903c47c9
e6b655da4d9cb3a9031e36d9cd717bda249688b3488ecedd1a6ee8f3ec36764a
ec05bbdc9c3173963a0443eb265cc294f9e30737e17c85b662643765803e453c