10p.po1.workers.dev
Open in
urlscan Pro
2606:4700:3035::6815:155
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On January 05 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 4th 2022. Valid for: 3 months.
This is the only time 10p.po1.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:303... 2606:4700:3035::6815:155 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a02:6ea0:c00... 2a02:6ea0:c000::4 | 60068 (CDN77 ^_^) (CDN77 ^_^) | |
3 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
workers.dev
10p.po1.workers.dev |
7 KB |
1 |
icons8.com
img.icons8.com |
2 KB |
3 | 2 |
Domain | Requested by | |
---|---|---|
2 | 10p.po1.workers.dev |
10p.po1.workers.dev
|
1 | img.icons8.com |
10p.po1.workers.dev
|
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.po1.workers.dev R3 |
2022-01-04 - 2022-04-04 |
3 months | crt.sh |
*.icons8.com Sectigo RSA Domain Validation Secure Server CA |
2020-05-13 - 2022-05-13 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://10p.po1.workers.dev/
Frame ID: CF819943AAED35B1D12B91F90A995B76
Requests: 4 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
10p.po1.workers.dev/ |
7 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
10p.po1.workers.dev/ |
7 KB 3 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
usa.png
img.icons8.com/color/50/000000/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
10p.po1.workers.dev
img.icons8.com
2606:4700:3035::6815:155
2a02:6ea0:c000::4
23c25f60895f79c6c1d2988a68e8d3ef1b9efb1d7d0841d3f8f5902f86f1c87d
554291e49dae72ded542c8ef79282b0475e72e73e84d0ec51a22216520003888
f752c4e166d6bd695f47a28598bff42c9a1d9a4aa12684fc746243996d212627