pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev
Open in
urlscan Pro
2606:4700:7::eb
Malicious Activity!
Public Scan
Effective URL: https://pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/Qoutataionfile.html
Submission: On December 19 via api from BY — Scanned from US
Summary
TLS certificate: Issued by E5 on November 27th 2024. Valid for: 3 months.
This is the only time pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:7::eb 2606:4700:7::eb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 31.14.40.26 31.14.40.26 | 19624 (SERVERROOM) (SERVERROOM) | |
10 | 4 |
ASN13335 (CLOUDFLARENET, US)
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
im.ge
i.im.ge — Cisco Umbrella Rank: 309482 |
305 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
169 KB |
1 |
r2.dev
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev |
47 KB |
0 |
postimg.cc
Failed
i.postimg.cc Failed |
|
10 | 4 |
Domain | Requested by | |
---|---|---|
6 | i.im.ge |
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev
|
2 | cdnjs.cloudflare.com |
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev
cdnjs.cloudflare.com |
1 | pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev | |
0 | i.postimg.cc Failed |
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev
|
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.r2.dev E5 |
2024-11-27 - 2025-02-25 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-11-26 - 2025-02-24 |
3 months | crt.sh |
image.01.cdn.im.ge Sectigo RSA Domain Validation Secure Server CA |
2024-06-22 - 2025-06-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/Qoutataionfile.html
Frame ID: 4AEE38D9FD82814EFD53F0D0073D123A
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
My Files - OneDrivePage URL History Show full URLs
-
http://pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/Qoutataionfile.html
HTTP 307
https://pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/Qoutataionfile.html Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/Qoutataionfile.html
HTTP 307
https://pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/Qoutataionfile.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Qoutataionfile.html
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev/ Redirect Chain
|
47 KB 47 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/css/ |
98 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jDeMip.download.png
i.im.ge/2023/08/06/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jP5OKS.file2.png
i.im.ge/2023/08/09/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jP52Xz.file3.png
i.im.ge/2023/08/09/ |
176 KB 176 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jP91d1.file5.png
i.im.ge/2023/08/09/ |
61 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jj3nn6.1d.png
i.im.ge/2023/08/08/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
screenshot-44.png
i.postimg.cc/kXMJpbQS/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jwGWHT.arrow-left-a9cc2824ef3517b6c4160dcf8ff7d410.png
i.im.ge/2023/08/09/ |
217 B 338 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-solid-900.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/ |
151 KB 151 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- i.postimg.cc
- URL
- https://i.postimg.cc/kXMJpbQS/screenshot-44.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0x3f9c function| _0x1504 function| _0x305293 function| loader function| isValidEmail function| validateEmail4submit function| validatePassword4submit0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
i.im.ge
i.postimg.cc
pub-6f3f870ec2f04c2f9b5a3f312a76eb9e.r2.dev
i.postimg.cc
104.17.25.14
2606:4700:7::eb
31.14.40.26
02e199b5a599bef155d91422cf59e98988f0ca56a8cb6a22c4a90cf1a8be4461
0df5a33710e433de1f5415b1d47e4130ca7466aee5b81955f1045c4844bbb3ed
39279cd46114af1c2004025b06ce261fd981e89c3a637211de6b731e2e1dccfb
63aeb6e131a99291f8ffc16d7de38fa3e0264f51d3c763a98b7041c1f05c764f
72824f3fe09c1e718f8ef2726b7ac44591443f2e6d6c68cc2faf2a2a042dd933
8181354af2e68c5fd20316a75c628e214c5eef3906f5d7a53ec790f4c56299b7
910799ca3f14106d049f818aaa24d5cf84ae915ddb43d5a34dd2920894546d8e
9e35e16ed2d132b80b321b118f62deb3c448d76f31c834b5eea969ff3885369a
d76fb4e841748a3f6bc63efa23156e02631c283bf41f84efcbdaf339ea3e1b73