wrangler.lcohen506.workers.dev
Open in
urlscan Pro
2a06:98c1:3121::3
Malicious Activity!
Public Scan
Effective URL: https://wrangler.lcohen506.workers.dev/ckln?rt=hn&em=
Submission: On November 23 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on October 28th 2022. Valid for: 3 months.
This is the only time wrangler.lcohen506.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 142.4.29.152 142.4.29.152 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6810:5714 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 5 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 142-4-29-152.unifiedlayer.com
mikalile.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 400 |
25 KB |
1 |
web.app
falilaketan.web.app |
25 KB |
1 |
workers.dev
wrangler.lcohen506.workers.dev |
938 B |
1 |
mikalile.com
mikalile.com |
345 B |
4 | 4 |
Domain | Requested by | |
---|---|---|
1 | cdn.jsdelivr.net |
wrangler.lcohen506.workers.dev
|
1 | falilaketan.web.app |
wrangler.lcohen506.workers.dev
|
1 | wrangler.lcohen506.workers.dev | |
1 | mikalile.com | |
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mikalile.com cPanel, Inc. Certification Authority |
2022-11-02 - 2023-01-31 |
3 months | crt.sh |
*.lcohen506.workers.dev GTS CA 1P5 |
2022-10-28 - 2023-01-26 |
3 months | crt.sh |
web.app GTS CA 1D4 |
2022-10-19 - 2023-01-17 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-02 - 2023-06-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://wrangler.lcohen506.workers.dev/ckln?rt=hn&em=
Frame ID: F1EB36F67E4972DDF0D6A8882ECC53AB
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
LoadingDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
mikalile.com/folder/rdiret/ |
0 345 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
ckln
wrangler.lcohen506.workers.dev/ |
954 B 938 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
falilaketan.web.app/css/ |
177 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@4.4.1/dist/css/ |
156 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
falilaketan.web.app
mikalile.com
wrangler.lcohen506.workers.dev
142.4.29.152
2606:4700::6810:5714
2620:0:890::100
2a06:98c1:3121::3
13bbe11ebc3c3a26a27c69920394b5c5e8839cfdfeeec007275dbc424f1cb781
2ff5b959fa9f6b4b1d04d20a37d706e90039176ab1e2a202994d9580baeebfd6
4ab246906bc6cc699c9f0641ad2a9210ad8336973304e16db8e844b008c44555
d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855