metamusklogix.webflow.io
Open in
urlscan Pro
151.101.66.188
Malicious Activity!
Public Scan
Submission: On September 05 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by GlobalSign Atlas R3 DV TLS CA 2023 Q4 on November 29th 2023. Valid for: a year.
This is the only time metamusklogix.webflow.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Metamask (Crypto)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 151.101.66.188 151.101.66.188 | 54113 (FASTLY) (FASTLY) | |
4 | 172.64.153.29 172.64.153.29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 3.161.127.194 3.161.127.194 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 3 |
ASN13335 (CLOUDFLARENET, US)
cdn.prod.website-files.com |
ASN16509 (AMAZON-02, US)
PTR: server-3-161-127-194.vie50.r.cloudfront.net
d3e54v103j8qbb.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
website-files.com
cdn.prod.website-files.com — Cisco Umbrella Rank: 11800 |
126 KB |
1 |
cloudfront.net
d3e54v103j8qbb.cloudfront.net |
30 KB |
1 |
webflow.io
metamusklogix.webflow.io |
1 KB |
6 | 3 |
Domain | Requested by | |
---|---|---|
4 | cdn.prod.website-files.com |
metamusklogix.webflow.io
|
1 | d3e54v103j8qbb.cloudfront.net |
metamusklogix.webflow.io
|
1 | metamusklogix.webflow.io | |
6 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
causesconighty.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.webflow.io GlobalSign Atlas R3 DV TLS CA 2023 Q4 |
2023-11-29 - 2024-12-30 |
a year | crt.sh |
prod.website-files.com WE1 |
2024-08-23 - 2024-11-21 |
3 months | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2024-07-30 - 2025-07-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://metamusklogix.webflow.io/
Frame ID: 856DD5C28BDB2DBBA3111149E771C0B0
Requests: 6 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
metamusklogix.webflow.io/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
metamusklogix.webflow.66a951ca5.css
cdn.prod.website-files.com/64d1da72fedb4726635243d6/css/ |
36 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.dc5e7f18c8.js
d3e54v103j8qbb.cloudfront.net/js/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
webflow.24a563ff7.js
cdn.prod.website-files.com/64d1da72fedb4726635243d6/js/ |
37 KB 14 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
64d1dab6c58206c07f048d3e_meta_banner_ege.jpg
cdn.prod.website-files.com/64d1da72fedb4726635243d6/ |
102 KB 103 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
64d1dad55e12abf938fdcf4a_Metamask%20(1).png
cdn.prod.website-files.com/64d1da72fedb4726635243d6/ |
749 B 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Metamask (Crypto)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| tram object| Webflow0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-ancestors 'self' https://*.webflow.com http://*.webflow.com http://*.webflow.io http://webflow.com https://webflow.com |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.prod.website-files.com
d3e54v103j8qbb.cloudfront.net
metamusklogix.webflow.io
151.101.66.188
172.64.153.29
3.161.127.194
42ebe676344ce06cd4df40f82e6ce5d899bde9a89691ef37e8f732cabb70e1da
694149945b4435476056a3add52c625dbe118763e9531e31197f7feeb62581c2
85a78ae27fc4dad59836c2d3a2f38faf48f33b990875dd018239ae86bb326939
8ee1a5786f624e6b8903274efc9887aa01440bc3b10c951f3344463cabb395a1
ad634a64d9a4949c1d523ffd6e4796f45a7be15865d2ab1638f8e09fd0dcd2e1
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d