yahososlogin.mudrupatro.workers.dev Open in urlscan Pro
104.21.78.210  Malicious Activity! Public Scan

URL: https://yahososlogin.mudrupatro.workers.dev/
Submission: On July 12 via api from JP — Scanned from JP

Summary

This website contacted 4 IPs in 3 countries across 3 domains to perform 4 HTTP transactions. The main IP is 104.21.78.210, located in and belongs to CLOUDFLARENET, US. The main domain is yahososlogin.mudrupatro.workers.dev.
TLS certificate: Issued by GTS CA 1P5 on July 10th 2023. Valid for: 3 months.
This is the only time yahososlogin.mudrupatro.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
2 104.21.78.210 13335 (CLOUDFLAR...)
1 89.187.160.27 60068 (CDN77 ^_^)
1 64.185.227.156 18450 (WEBNX)
4 4
Apex Domain
Subdomains
Transfer
2 workers.dev
yahososlogin.mudrupatro.workers.dev
9 KB
1 ipify.org
api.ipify.org — Cisco Umbrella Rank: 2382
204 B
1 icons8.com
img.icons8.com — Cisco Umbrella Rank: 34511
2 KB
4 3
Domain Requested by
2 yahososlogin.mudrupatro.workers.dev yahososlogin.mudrupatro.workers.dev
1 api.ipify.org yahososlogin.mudrupatro.workers.dev
1 img.icons8.com yahososlogin.mudrupatro.workers.dev
4 3

This site contains no links.

Subject Issuer Validity Valid
mudrupatro.workers.dev
GTS CA 1P5
2023-07-10 -
2023-10-08
3 months crt.sh
1004834818.rsc.cdn77.org
R3
2023-07-09 -
2023-10-07
3 months crt.sh
*.ipify.org
Sectigo RSA Domain Validation Secure Server CA
2023-02-07 -
2024-02-18
a year crt.sh

This page contains 1 frames:

Primary Page: https://yahososlogin.mudrupatro.workers.dev/
Frame ID: 01D55E56186C2F80AC9EB64639878AF8
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Yahoo

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

3
Countries

11 kB
Transfer

32 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
yahososlogin.mudrupatro.workers.dev/
15 KB
4 KB
Document
General
Full URL
https://yahososlogin.mudrupatro.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.21.78.210 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e4fd74bf2121c14bb307aefb8549a5c9d427bada81b5001f057d3cfff78f27ba

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36
accept-language
jp-jp,jp;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-ray
7e553500bb1a8093-NRT
content-encoding
br
content-type
text/html;charset=UTF-8
date
Wed, 12 Jul 2023 00:35:35 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=rVTZwuDEElfPxw39wub26pW%2FQNwlDEI0paCBSKrA2kEFh9a0PXuI%2BnrrAPqyM2wJEm%2FbCAHhr5sUqFM56NHR9XtANtBF0%2FJRxCjWwVxkmYzrt5FoDp%2Bt2HiJSmZJyVWJ1W8mtWmjgXymS%2BzYW297ssAnCeNyDA%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
style.css
yahososlogin.mudrupatro.workers.dev/
15 KB
4 KB
Stylesheet
General
Full URL
https://yahososlogin.mudrupatro.workers.dev/style.css
Requested by
Host: yahososlogin.mudrupatro.workers.dev
URL: https://yahososlogin.mudrupatro.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.21.78.210 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e4fd74bf2121c14bb307aefb8549a5c9d427bada81b5001f057d3cfff78f27ba

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
https://yahososlogin.mudrupatro.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36

Response headers

date
Wed, 12 Jul 2023 00:35:35 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=y3vGDfg37pmLYXv8%2BgBShrfWG6APQGGVv%2F9en2VWb6iY3%2BO3JgL3Bw3duQKbWda22dUBvCn3naDQlv7rEgGlBuYqDeZ2SKzosCErX3z4lirIKCIa8eXkWmSOwhFZeMPthy0OIZkLsMRrLckBeMy1WhQB8EHDyA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/html;charset=UTF-8
cf-ray
7e5535027c118093-NRT
alt-svc
h3=":443"; ma=86400
google-logo.png
img.icons8.com/color/50/000000/
1 KB
2 KB
Image
General
Full URL
https://img.icons8.com/color/50/000000/google-logo.png
Requested by
Host: yahososlogin.mudrupatro.workers.dev
URL: https://yahososlogin.mudrupatro.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
89.187.160.27 Tokyo, Japan, ASN60068 (CDN77 ^_^, GB),
Reverse DNS
214543246.tyo.cdn77.com
Software
CDN77-Turbo /
Resource Hash
1a120e58f75551ccd9d96cdb3c285008a750de5c4eb18b66f2b036a588031955
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
https://yahososlogin.mudrupatro.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36

Response headers

x-77-pop
tokyoJP
date
Wed, 12 Jul 2023 00:35:35 GMT
strict-transport-security
max-age=15724800; includeSubDomains
version
0.0.29
icon-format
png
x-cache
HIT
x-77-cache
HIT
x-age
281842
x-accel-date
1688840293
content-length
1335
x-77-nzt
AVm7oBrFU77/8kwEAA
x-accel-expires
@1689142693
not-found-platform
false
icon-size
50
last-modified
Mon, 26 Jun 2023 21:51:19
from-mongo-cache
true
server
CDN77-Turbo
x-77-nzt-ray
8eabc90c8acd52b757f5ad64d68e6339
vary
Origin
from-redis-cache
false
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=302400
accept-ranges
bytes
icon-id
17949
/
api.ipify.org/
30 B
204 B
Script
General
Full URL
https://api.ipify.org/?format=jsonp&callback=getIP
Requested by
Host: yahososlogin.mudrupatro.workers.dev
URL: https://yahososlogin.mudrupatro.workers.dev/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
64.185.227.156 Los Angeles, United States, ASN18450 (WEBNX, US),
Reverse DNS
64-185-227-156.static.webnx.com
Software
nginx/1.25.1 /
Resource Hash
e1053f30960c5fc0044af975931934bc0af7cea97783e5523aa2cf8885872de6

Request headers

Referer
https://yahososlogin.mudrupatro.workers.dev/
accept-language
jp-jp,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Wed, 12 Jul 2023 00:35:36 GMT
Server
nginx/1.25.1
Connection
keep-alive
Content-Length
30
Vary
Origin
Content-Type
application/javascript
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0fdefe26bac6a6b0b06fe67984582f887af70b7da25d6cb1b401f9074db58338

Request headers

accept-language
jp-jp,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Yahoo (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend function| getIP

0 Cookies

1 Console Messages

Source Level URL
Text
javascript warning URL: https://yahososlogin.mudrupatro.workers.dev/(Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://api.ipify.org/?format=jsonp&callback=getIP, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.