45797a79-53ee4413.xenox.cfd
Open in
urlscan Pro
20.203.171.106
Public Scan
Effective URL: https://45797a79-53ee4413.xenox.cfd/login/login.htm?fromURI=%2Fapp%2Foffice365%2Fexk2uj8t0ud7Nwvny5d6%2Fsso%2Fwsfed%2Fpassive%3Flogi...
Submission: On March 21 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 21st 2023. Valid for: 3 months.
This is the only time 45797a79-53ee4413.xenox.cfd was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a02:26f0:280... 2a02:26f0:280:196::23ed | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
5 | 2606:4700::68... 2606:4700::6812:672 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:3865 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 6 | 20.203.171.106 20.203.171.106 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
15 | 4 |
ASN13335 (CLOUDFLARENET, US)
ugbdwl.codesandbox.io | |
codesandbox.io |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
lmo.xenox.cfd | |
45797a79-53ee4413.xenox.cfd |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
xenox.cfd
2 redirects
lmo.xenox.cfd 45797a79-53ee4413.xenox.cfd 4f9b047b-53ee4413.xenox.cfd Failed |
292 KB |
5 |
codesandbox.io
ugbdwl.codesandbox.io codesandbox.io — Cisco Umbrella Rank: 73255 |
50 KB |
1 |
cloudflareinsights.com
static.cloudflareinsights.com — Cisco Umbrella Rank: 886 |
6 KB |
1 |
naukrigulf.com
1 redirects
www.naukrigulf.com — Cisco Umbrella Rank: 428145 |
1 KB |
15 | 4 |
Domain | Requested by | |
---|---|---|
4 | lmo.xenox.cfd |
1 redirects
ugbdwl.codesandbox.io
lmo.xenox.cfd |
4 | codesandbox.io |
ugbdwl.codesandbox.io
codesandbox.io |
2 | 45797a79-53ee4413.xenox.cfd |
1 redirects
lmo.xenox.cfd
45797a79-53ee4413.xenox.cfd |
1 | static.cloudflareinsights.com |
ugbdwl.codesandbox.io
|
1 | ugbdwl.codesandbox.io | |
1 | www.naukrigulf.com | 1 redirects |
0 | 4f9b047b-53ee4413.xenox.cfd Failed |
45797a79-53ee4413.xenox.cfd
|
15 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
codesandbox.io Cloudflare Inc ECC CA-3 |
2023-03-19 - 2024-03-18 |
a year | crt.sh |
*.nodebox.codesandbox.io E1 |
2023-03-08 - 2023-06-06 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-05-11 - 2023-05-10 |
a year | crt.sh |
xenox.cfd R3 |
2023-03-21 - 2023-06-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://45797a79-53ee4413.xenox.cfd/login/login.htm?fromURI=%2Fapp%2Foffice365%2Fexk2uj8t0ud7Nwvny5d6%2Fsso%2Fwsfed%2Fpassive%3Flogin_hint%3Diuliana.ilea%2540fanduel.com%26client-request-id%3D28e4ce76-33e8-47d9-8dd0-edbf977cfc8f%26username%3Diuliana.ilea%2540fanduel.com%26wa%3Dwsignin1.0%26wtrealm%3Durn%253Afederation%253AMicrosoftOnline%26wctx%3Destsredirect%253D2%2526estsrequest%253DrQQIARAA42Kw0skoKSkottLXL8gvKknM0cvNTC7KL85PK8nPy8nMS9VLzs_Vyy9Kz0wBsYqEuATKzj3ReGF80733wtv902v-9K9iVCZshP4FRsYXjIyTmCQyS3MyE_MS9TJzUhMd0hLzUkpTc0AqbjEJ-hele6aEF7ulpqQWJZZk5uc9Ysap_AKLwCsWHgNmKw4OLgEGCQYFhh8sjItYge5LzzdeNb__l9sSK6k1_NwMDKdY9S2rLIpNXDy9w5wi04rM_RKrcsOyPQzcigqT8y1DTZLM_EMSA5IsUiwNHC1sLawMJ7AJTWBjOsXG8IGNsYOdYRY7wwFOxgO8DD_4Ds18MnXzqVNvPV7x6xRrJ3paBJR5J1lkO0WmJOsbp-b7h3qlVhmkJHqWGpqYhZiaJGkHVZZ6u0faAgA1
Frame ID: 890FB688266294B3EF0A122F0703E91A
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.naukrigulf.com/nglogin/user/mailerLogin?conmailer=9cca59ac38d3efecbce4a1e6e38af2f2%7C~%7CZ2...
HTTP 303
https://ugbdwl.codesandbox.io/ Page URL
- https://lmo.xenox.cfd/?eqp=dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t Page URL
- https://lmo.xenox.cfd/?eqp=dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t Page URL
-
https://lmo.xenox.cfd/?eqp=dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t&sso_reload=true
HTTP 302
https://45797a79-53ee4413.xenox.cfd/app/office365/exk2uj8t0ud7Nwvny5d6/sso/wsfed/passive?login_hint=iuliana.ilea... HTTP 302
https://45797a79-53ee4413.xenox.cfd/login/login.htm?fromURI=%2Fapp%2Foffice365%2Fexk2uj8t0ud7Nwvny5d6%2Fsso%2Fws... Page URL
Detected technologies
Akamai Bot Manager (Security) ExpandDetected patterns
Cloudflare Browser Insights (Analytics) Expand
Detected patterns
- static\.cloudflareinsights\.com/beacon(?:\.min)?\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.naukrigulf.com/nglogin/user/mailerLogin?conmailer=9cca59ac38d3efecbce4a1e6e38af2f2%7C~%7CZ2VyYXJkYm9pc21hcnRpbkBiaWdwb25kLmNvbQ%3D%3D%7C%2A%2A%2A%2A%7C1%7C~~%7C20230129&rUrl=https%3A%2F%2Fugbdwl.codesandbox.io%2F%23dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t
HTTP 303
https://ugbdwl.codesandbox.io/ Page URL
- https://lmo.xenox.cfd/?eqp=dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t Page URL
- https://lmo.xenox.cfd/?eqp=dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t Page URL
-
https://lmo.xenox.cfd/?eqp=dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t&sso_reload=true
HTTP 302
https://45797a79-53ee4413.xenox.cfd/app/office365/exk2uj8t0ud7Nwvny5d6/sso/wsfed/passive?login_hint=iuliana.ilea%40fanduel.com&client-request-id=28e4ce76-33e8-47d9-8dd0-edbf977cfc8f&username=iuliana.ilea%40fanduel.com&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=estsredirect%3d2%26estsrequest%3drQQIARAA42Kw0skoKSkottLXL8gvKknM0cvNTC7KL85PK8nPy8nMS9VLzs_Vyy9Kz0wBsYqEuATKzj3ReGF80733wtv902v-9K9iVCZshP4FRsYXjIyTmCQyS3MyE_MS9TJzUhMd0hLzUkpTc0AqbjEJ-hele6aEF7ulpqQWJZZk5uc9Ysap_AKLwCsWHgNmKw4OLgEGCQYFhh8sjItYge5LzzdeNb__l9sSK6k1_NwMDKdY9S2rLIpNXDy9w5wi04rM_RKrcsOyPQzcigqT8y1DTZLM_EMSA5IsUiwNHC1sLawMJ7AJTWBjOsXG8IGNsYOdYRY7wwFOxgO8DD_4Ds18MnXzqVNvPV7x6xRrJ3paBJR5J1lkO0WmJOsbp-b7h3qlVhmkJHqWGpqYhZiaJGkHVZZ6u0faAgA1 HTTP 302
https://45797a79-53ee4413.xenox.cfd/login/login.htm?fromURI=%2Fapp%2Foffice365%2Fexk2uj8t0ud7Nwvny5d6%2Fsso%2Fwsfed%2Fpassive%3Flogin_hint%3Diuliana.ilea%2540fanduel.com%26client-request-id%3D28e4ce76-33e8-47d9-8dd0-edbf977cfc8f%26username%3Diuliana.ilea%2540fanduel.com%26wa%3Dwsignin1.0%26wtrealm%3Durn%253Afederation%253AMicrosoftOnline%26wctx%3Destsredirect%253D2%2526estsrequest%253DrQQIARAA42Kw0skoKSkottLXL8gvKknM0cvNTC7KL85PK8nPy8nMS9VLzs_Vyy9Kz0wBsYqEuATKzj3ReGF80733wtv902v-9K9iVCZshP4FRsYXjIyTmCQyS3MyE_MS9TJzUhMd0hLzUkpTc0AqbjEJ-hele6aEF7ulpqQWJZZk5uc9Ysap_AKLwCsWHgNmKw4OLgEGCQYFhh8sjItYge5LzzdeNb__l9sSK6k1_NwMDKdY9S2rLIpNXDy9w5wi04rM_RKrcsOyPQzcigqT8y1DTZLM_EMSA5IsUiwNHC1sLawMJ7AJTWBjOsXG8IGNsYOdYRY7wwFOxgO8DD_4Ds18MnXzqVNvPV7x6xRrJ3paBJR5J1lkO0WmJOsbp-b7h3qlVhmkJHqWGpqYhZiaJGkHVZZ6u0faAgA1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://www.naukrigulf.com/nglogin/user/mailerLogin?conmailer=9cca59ac38d3efecbce4a1e6e38af2f2%7C~%7CZ2VyYXJkYm9pc21hcnRpbkBiaWdwb25kLmNvbQ%3D%3D%7C%2A%2A%2A%2A%7C1%7C~~%7C20230129&rUrl=https%3A%2F%2Fugbdwl.codesandbox.io%2F%23dXNlcm5hbWU9aXVsaWFuYS5pbGVhQGZhbmR1ZWwuY29t HTTP 303
- https://ugbdwl.codesandbox.io/
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
ugbdwl.codesandbox.io/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.f742b80f43c5a2e0e619b0d97b5886cd.js
codesandbox.io/public/sse-hooks/ |
172 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.0b5d84a2b.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.f4f9aed52.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vaafb692b2aea4879b33c060e79fe94621666317369993
static.cloudflareinsights.com/beacon.min.js/ |
17 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phishing
codesandbox.io/api/v1/sandboxes/ugbdwl/ |
33 B 415 B |
Fetch
application/vnd.github.v3+json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
lmo.xenox.cfd/ |
350 KB 118 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
lmo.xenox.cfd/ |
196 B 361 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
lmo.xenox.cfd/ |
508 KB 172 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.htm
45797a79-53ee4413.xenox.cfd/login/ Redirect Chain
|
18 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
okta-sign-in.min.js
4f9b047b-53ee4413.xenox.cfd/assets/js/sdk/okta-signin-widget/7.4.0/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
okta-sign-in.min.css
4f9b047b-53ee4413.xenox.cfd/assets/js/sdk/okta-signin-widget/7.4.0/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
loginpage-theme.c1227d73b70be13e51aae80fe238b0ae.css
4f9b047b-53ee4413.xenox.cfd/assets/loginpage/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
style-sheet
45797a79-53ee4413.xenox.cfd/api/internal/brand/theme/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
gfs8aknu6fDCpKCP95d6
4f9b047b-53ee4413.xenox.cfd/fs/bcg/4/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- 4f9b047b-53ee4413.xenox.cfd
- URL
- https://4f9b047b-53ee4413.xenox.cfd/assets/js/sdk/okta-signin-widget/7.4.0/js/okta-sign-in.min.js
- Domain
- 4f9b047b-53ee4413.xenox.cfd
- URL
- https://4f9b047b-53ee4413.xenox.cfd/assets/js/sdk/okta-signin-widget/7.4.0/css/okta-sign-in.min.css
- Domain
- 4f9b047b-53ee4413.xenox.cfd
- URL
- https://4f9b047b-53ee4413.xenox.cfd/assets/loginpage/css/loginpage-theme.c1227d73b70be13e51aae80fe238b0ae.css
- Domain
- 45797a79-53ee4413.xenox.cfd
- URL
- https://45797a79-53ee4413.xenox.cfd/api/internal/brand/theme/style-sheet?touch-point=SIGN_IN_PAGE&v=abc4780733b2999dc5536ea4bf18a7237d32beafe91e2f7611b8af3ecb8ae0d0dfb208992a3b1ecefd0c0f9333f4b59d
- Domain
- 4f9b047b-53ee4413.xenox.cfd
- URL
- https://4f9b047b-53ee4413.xenox.cfd/fs/bcg/4/gfs8aknu6fDCpKCP95d6
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless21 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.naukrigulf.com/nglogin/user | Name: _t_ds Value: 5d234891679434098-115d23489-05d23489 |
|
www.naukrigulf.com/nglogin/user | Name: aka_location Value: Country=DE |
|
.naukrigulf.com/ | Name: _ngenv1[lang] Value: en |
|
.naukrigulf.com/ | Name: puppeteer Value: FALSE |
|
.naukrigulf.com/ | Name: resmanexp Value: |
|
.naukrigulf.com/ | Name: mboost Value: false |
|
.naukrigulf.com/ | Name: mboost50 Value: false |
|
www.naukrigulf.com/ | Name: profileCom Value: y |
|
www.naukrigulf.com/ | Name: chatbotonorganicresman Value: n |
|
www.naukrigulf.com/ | Name: chatbotonmarketingresman Value: y |
|
www.naukrigulf.com/ | Name: chatbotonmarketingresmanAr Value: n |
|
www.naukrigulf.com/ | Name: chatbotonorganicresmanAr Value: n |
|
.naukrigulf.com/ | Name: countryc Value: DE |
|
.naukrigulf.com/ | Name: countryn Value: Germany |
|
.naukrigulf.com/ | Name: city Value: Frankfurt am Main |
|
.naukrigulf.com/ | Name: state Value: Hesse |
|
.naukrigulf.com/ | Name: ak_bmsc Value: 329651C66EB01FA42D83F3F94EACCC4E~000000000000000000000000000000~YAAQTXcTAn1X7ASHAQAA9acSBhOsxl6A/r/xQbnazdXo86iZlbUreOVtE5bT4GyZU3pzCPGZaEuph6TkhRepOpbe3AGwIsZ556tCZuva8Rl04ciEU65xZsvNHutSty/0vY7AQS3wfPEn/lJm0dsnUy4SP5XKcCu6enpoLncfV8vvtki1s3pkPBMCEs7l5173ibqFxwyy8biNrgGcinengJtbmCJS1y9hWyaO2uboe1LCSy3eF+C/1vsHA58ShjyJlOyYZP6LK1T7nsR3k7JoaxDPD0wuyXjXJEDusrTMgyQ8oCkg1gIv/Emq1Eij3dzlyr5EyMyVj30JePxrLj22HRuhFSYRXGIgCYq+aOtLUKG0fva2T/0WZAh5Afs2fGAHGoTfzH+0+F3KAMsJEBhjUOOsNk70RZabfwYUbHHgFOY2kDGQ |
|
.codesandbox.io/ | Name: _cfuvid Value: KLLX.kqtu1dtBbr1o1_KbQfmSZgKadz9ntrL7zP5uE0-1679434098796-0-604800000 |
|
.xenox.cfd/ | Name: WjzLSF Value: NTNlZTQ0MTMtM2M4ZS00NTlmLWE2YTQtMWU0YTU3Y2JiNWYxOjcyMDhiNzc4LTRjMmMtNGNhNi05OTM2LTViM2QwOTQ0MmJlNw== |
|
.lmo.xenox.cfd/ | Name: AADSSO Value: NA|NoExtension |
|
lmo.xenox.cfd/ | Name: SSOCOOKIEPULLED Value: 1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
45797a79-53ee4413.xenox.cfd
4f9b047b-53ee4413.xenox.cfd
codesandbox.io
lmo.xenox.cfd
static.cloudflareinsights.com
ugbdwl.codesandbox.io
www.naukrigulf.com
45797a79-53ee4413.xenox.cfd
4f9b047b-53ee4413.xenox.cfd
20.203.171.106
2606:4700::6810:3865
2606:4700::6812:672
2a02:26f0:280:196::23ed
5d32a15d4694a9a6cd245c8ce10acbb9ef6fe293331ca508a5ecc6ab78acc158
683fbdef88b2ebf85e44c498687952697f4093fb1ff40f884eb6a2f3c74d0bb7
6993c7947856b061aab31734e1e189bd2c2f2167d7b98a2aa21c746b83567ac6
d0c283396b56cb5a00a201dfcf747b0be0d20c3c2a1474ef4c112ff48ca60623
f1106067efbe9f294af3e193db9b28cf4603830e659d25170f3388857bee28a4