lxw43.codesandbox.io
Open in
urlscan Pro
2606:4700::6812:16cf
Malicious Activity!
Public Scan
Submission: On October 10 via manual from US
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 19th 2020. Valid for: a year.
This is the only time lxw43.codesandbox.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700::68... 2606:4700::6812:16cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:17cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 54.209.71.245 54.209.71.245 | 14618 (AMAZON-AES) (AMAZON-AES) | |
7 | 151.101.1.195 151.101.1.195 | 54113 (FASTLY) (FASTLY) | |
4 | 2606:4700::68... 2606:4700::6810:7baf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700::68... 2606:4700::6811:4f6b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2620:1ec:bdf::10 2620:1ec:bdf::10 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
21 | 8 |
ASN13335 (CLOUDFLARENET, US)
lxw43.codesandbox.io | |
codesandbox.io |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-209-71-245.compute-1.amazonaws.com
ameizoxposaewe.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
web.app
vkrisfoia.web.app |
181 KB |
4 |
cloudflare.com
cdnjs.cloudflare.com |
31 KB |
4 |
unpkg.com
unpkg.com |
75 KB |
3 |
codesandbox.io
lxw43.codesandbox.io codesandbox.io |
11 KB |
1 |
msauth.net
aadcdn.msauth.net |
1 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
herokuapp.com
ameizoxposaewe.herokuapp.com |
4 KB |
21 | 7 |
Domain | Requested by | |
---|---|---|
7 | vkrisfoia.web.app |
lxw43.codesandbox.io
|
4 | cdnjs.cloudflare.com |
lxw43.codesandbox.io
|
4 | unpkg.com |
lxw43.codesandbox.io
|
2 | codesandbox.io |
lxw43.codesandbox.io
|
1 | aadcdn.msauth.net |
lxw43.codesandbox.io
|
1 | ajax.googleapis.com |
lxw43.codesandbox.io
|
1 | ameizoxposaewe.herokuapp.com |
lxw43.codesandbox.io
|
1 | lxw43.codesandbox.io | |
21 | 8 |
This site contains links to these domains. Also see Links.
Domain |
---|
signup.live.com |
bit.ly |
Subject Issuer | Validity | Valid | |
---|---|---|---|
codesandbox.io Cloudflare Inc ECC CA-3 |
2020-06-19 - 2021-06-19 |
a year | crt.sh |
*.herokuapp.com DigiCert SHA2 High Assurance Server CA |
2020-06-15 - 2021-07-07 |
a year | crt.sh |
web.app GTS CA 1O1 |
2020-04-15 - 2021-04-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-02 - 2021-08-02 |
a year | crt.sh |
cdnjs.cloudflare.com DigiCert ECC Secure Server CA |
2020-08-12 - 2022-08-17 |
2 years | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-09-22 - 2020-12-15 |
3 months | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2020-10-09 - 2021-10-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://lxw43.codesandbox.io/?bbre=3iesdo3020
Frame ID: 8BE2B93E2FFC14D57893DE66B850E874
Requests: 21 HTTP requests in this frame
Screenshot
Detected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- script /(?:\/([\d.]+))?\/vue(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Lodash (JavaScript Libraries) Expand
Detected patterns
- script /lodash.*\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
lxw43.codesandbox.io/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.js
codesandbox.io/public/sse-hooks/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.ccc763f75.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SGNDeEp4UkNmV25DWnBRTlp0V215RkxMRW9nR3FuWXN3RGFoZ0E2dzU3dldZbDJNRzdIUElhUTIvZGsvQzNwcm83QkZkNVFidWdocGxpaEZGbWhoMHpMZ3l1T3dDTkhsU3h0NkpZelBoaklUdWlxaW1rQlB1MzFLbkQ0WWxjWmFPU0o1YzZxbTAwc3hzU09saFhNN...
ameizoxposaewe.herokuapp.com/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3542c0f727f06877411bd608f8005c6bnbr1602266531.css
vkrisfoia.web.app/uahxgcvxs/themes/css/ |
1 KB 638 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5eae21d5d19ec2f8cd1be7bc0b47accenbr1602266532.css
vkrisfoia.web.app/uahxgcvxs/themes/css/ |
127 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
unpkg.com/axios@0.16.1/dist/ |
34 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3542c0f727f06877411bd608f8005c6bnbr1602266531.js
vkrisfoia.web.app/uahxgcvxs/themes/ |
74 KB 18 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue.min.js
unpkg.com/vue@2.6.11/dist/ |
91 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue-router.min.js
unpkg.com/vue-router@2.7.0/dist/ |
23 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vuex.min.js
cdnjs.cloudflare.com/ajax/libs/vuex/2.3.1/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vee-validate.min.js
cdnjs.cloudflare.com/ajax/libs/vee-validate/2.0.0-rc.3/ |
42 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue-i18n.min.js
cdnjs.cloudflare.com/ajax/libs/vue-i18n/7.0.3/ |
14 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lodash.min.js
unpkg.com/lodash@4.17.4/ |
71 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mobile-detect.min.js
cdnjs.cloudflare.com/ajax/libs/mobile-detect/1.3.6/ |
37 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b20da54a4971566b674dcf30bb22a5bb.js
vkrisfoia.web.app/uahxgcvxs/themes/ |
401 KB 133 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a3107e4d4ae0ea783cd1177c52f1e6301602266514.js
vkrisfoia.web.app/uahxgcvxs/themes/js/ |
32 KB 13 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
vkrisfoia.web.app/uahxgcvxs/themes/imgs/ |
4 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey.svg
vkrisfoia.web.app/uahxgcvxs/themes/imgs/ |
915 B 342 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/ests/2.1/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)364 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| _0x2271 object| p4 function| v7 function| jk string| emfromgetnbrtoo object| script34ssd function| nb object| ck function| uo function| loadScript object| dml function| kf function| axios undefined| vbody undefined| frame undefined| frameDocument undefined| prototype undefined| cache undefined| shiv undefined| elements undefined| nativeCreateElement undefined| interval undefined| loopLimit undefined| _typeof function| isnbrstoAvailable undefined| bodyCheck function| ES6Promise function| Vue function| VueRouter object| Vuex function| $ function| jQuery object| VeeValidate function| VueI18n function| _ function| MobileDetect object| rp function| upu object| YAHOO object| CryptoJS string| b64map string| b64pad function| hex2b64 function| b64tohex function| b64toBA number| dbits number| canary boolean| j_lm function| BigInteger function| nbi function| am1 function| am2 function| am3 number| BI_FP string| BI_RM object| BI_RC number| rr number| vv function| int2char function| intAt function| bnpCopyTo function| bnpFromInt function| nbv function| bnpFromString function| bnpClamp function| bnToString function| bnNegate function| bnAbs function| bnCompareTo function| nbits function| bnBitLength function| bnpDLShiftTo function| bnpDRShiftTo function| bnpLShiftTo function| bnpRShiftTo function| bnpSubTo function| bnpMultiplyTo function| bnpSquareTo function| bnpDivRemTo function| bnMod function| Classic function| cConvert function| cRevert function| cReduce function| cMulTo function| cSqrTo function| bnpInvDigit function| Montgomery function| montConvert function| montRevert function| montReduce function| montSqrTo function| montMulTo function| bnpIsEven function| bnpExp function| bnModPowInt function| bnClone function| bnIntValue function| bnByteValue function| bnShortValue function| bnpChunkSize function| bnSigNum function| bnpToRadix function| bnpFromRadix function| bnpFromNumber function| bnToByteArray function| bnEquals function| bnMin function| bnMax function| bnpBitwiseTo function| op_and function| bnAnd function| op_or function| bnOr function| op_xor function| bnXor function| op_andnot function| bnAndNot function| bnNot function| bnShiftLeft function| bnShiftRight function| lbit function| bnGetLowestSetBit function| cbit function| bnBitCount function| bnTestBit function| bnpChangeBit function| bnSetBit function| bnClearBit function| bnFlipBit function| bnpAddTo function| bnAdd function| bnSubtract function| bnMultiply function| bnSquare function| bnDivide function| bnRemainder function| bnDivideAndRemainder function| bnpDMultiply function| bnpDAddOffset function| NullExp function| nNop function| nMulTo function| nSqrTo function| bnPow function| bnpMultiplyLowerTo function| bnpMultiplyUpperTo function| Barrett function| barrettConvert function| barrettRevert function| barrettReduce function| barrettSqrTo function| barrettMulTo function| bnModPow function| bnGCD function| bnpModInt function| bnModInverse object| lowprimes number| lplim function| bnIsProbablePrime function| bnpMillerRabin function| Arcfour function| ARC4init function| ARC4next function| prng_newstate number| rng_psize undefined| rng_state object| rng_pool number| rng_pptr function| rng_seed_int function| rng_seed_time number| t object| ua undefined| z function| rng_get_byte function| rng_get_bytes function| SecureRandom function| parseBigInt function| linebrk function| byte2Hex function| pkcs1pad2 function| oaep_mgf1_arr function| oaep_pad function| RSAKey function| RSASetPublic function| RSADoPublic function| RSAEncrypt function| RSAEncryptOAEP function| pkcs1unpad2 function| oaep_mgf1_str function| oaep_unpad function| RSASetPrivate function| RSASetPrivateEx function| RSAGenerate function| RSADoPrivate function| RSADecrypt function| RSADecryptOAEP function| ECFieldElementFp function| feFpEquals function| feFpToBigInteger function| feFpNegate function| feFpAdd function| feFpSubtract function| feFpMultiply function| feFpSquare function| feFpDivide function| ECPointFp function| pointFpGetX function| pointFpGetY function| pointFpEquals function| pointFpIsInfinity function| pointFpNegate function| pointFpAdd function| pointFpTwice function| pointFpMultiply function| pointFpMultiplyTwo function| ECCurveFp function| curveFpGetQ function| curveFpGetA function| curveFpGetB function| curveFpEquals function| curveFpGetInfinity function| curveFpFromBigInteger function| curveFpDecodePointHex function| jsonParse object| ASN1HEX object| KJUR function| utf8tob64u function| b64utoutf8 function| Base64x function| stoBA function| BAtos function| BAtohex function| stohex function| stob64 function| stob64u function| b64utos function| b64tob64u function| b64utob64 function| hextob64u function| b64utohex function| utf8tob64 function| b64toutf8 function| utf8tohex function| hextoutf8 function| hextorstr function| rstrtohex function| hextob64 function| hextob64nl function| b64nltohex function| hextopem function| pemtohex function| hextoArrayBuffer function| ArrayBuffertohex function| zulutomsec function| zulutosec function| zulutodate function| datetozulu function| uricmptohex function| hextouricmp function| encodeURIComponentAll function| newline_toUnix function| newline_toDos function| hextoposhex function| intarystrtohex function| strdiffidx object| KEYUTIL object| _RE_HEXDECONLY function| _rsasign_getHexPaddedDigestInfoForString function| _zeroPaddingOfSignature function| pss_mgf1_str function| _rsasign_getDecryptSignatureBI function| _rsasign_getHexDigestInfoFromSig function| _rsasign_getAlgNameAndHashFromHexDisgestInfo function| X509 function| makeCRCNBR function| nbrenpnbry function| iluvutcnbr3062991 function| findPathbyName function| loadComponent function| load_recaptcha_bylang function| defaultReducer function| canWriteToLocalStorage function| _classCallCheck object| defaultStorage function| _typeofNBRPLUGIN function| creatNBRSystemStorage function| TouchMenuLA object| currencyValidator function| _createClassTOUCH function| getPointerData function| getPosition function| TrackerSupportTOUCH function| TouchRecord function| OverScrollNBRUT function| RippleNBRUT undefined| localNBRcookies object| NBR_VUE string| defaultLang object| store function| resetHeadersNBR function| changeLangtoURLNBR function| CancelToken object| nbrProcess function| instance function| instancesta string| emailex_off_to_hm string| emailex_hm_to_off function| randomId function| avoidreAU string| ch4kbat function| validrightrule function| requireAuth function| destroypageLogin function| scrollBehavior string| twnumoff string| LINKRE_RESULT string| TXT_RE string| EN_TXT_RE string| IMGE_TYPE_DR string| a_SH_GG string| a_SH_OFF string| a_SH_HM string| a_SH_YH string| a_SH_AL string| a_SH_IC string| a_SH_OT string| GrabEmailAPTS string| cus_link_off_app object| mapRoutes object| PAGE_TITLE string| __dirname string| validStepUlg function| closeOpenwinnbr object| router object| i18n function| i18nGobal object| configVeeValidate object| App object| LoadingBarVue function| ErrorReq function| dr function| VueTimeago function| VueKeepScrollPosition function| Progressive function| Swipe function| Cookie object| __locale__vi object| VueObserveVisibility function| VueHtml5Editor function| mRefresh object| or function| vm function| qp function| animatePip function| amannbrmaas number| c2 number| c1 number| c31 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.codesandbox.io/ | Name: __cfduid Value: d2caf5c738c5761809d1549f1970f97981602301716 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
ajax.googleapis.com
ameizoxposaewe.herokuapp.com
cdnjs.cloudflare.com
codesandbox.io
lxw43.codesandbox.io
unpkg.com
vkrisfoia.web.app
151.101.1.195
2606:4700::6810:7baf
2606:4700::6811:4f6b
2606:4700::6812:16cf
2606:4700::6812:17cf
2620:1ec:bdf::10
2a00:1450:4001:81d::200a
54.209.71.245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