3l.urj7z9q.com Open in urlscan Pro
2606:4700:3034::6815:41cb  Malicious Activity! Public Scan

URL: https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Submission Tags: falconsandbox
Submission: On November 22 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2606:4700:3034::6815:41cb, located in United States and belongs to CLOUDFLARENET, US. The main domain is 3l.urj7z9q.com.
TLS certificate: Issued by WE1 on November 4th 2024. Valid for: 3 months.
This is the only time 3l.urj7z9q.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Google (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a04:4e42:200... 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
2 urj7z9q.com
3l.urj7z9q.com
20 KB
1 googleusercontent.com
blogger.googleusercontent.com — Cisco Umbrella Rank: 10221
86 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 847
31 KB
4 3
Domain Requested by
2 3l.urj7z9q.com
1 blogger.googleusercontent.com 3l.urj7z9q.com
1 code.jquery.com 3l.urj7z9q.com
4 3

This site contains no links.

Subject Issuer Validity Valid
urj7z9q.com
WE1
2024-11-04 -
2025-02-02
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.googleusercontent.com
WR2
2024-10-21 -
2025-01-13
3 months crt.sh

This page contains 1 frames:

Primary Page: https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Frame ID: C17ADBEF79658EE4B5285CF289E63BC1
Requests: 5 HTTP requests in this frame

Screenshot

Page Title


Detected technologies

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

137 kB
Transfer

247 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
67 KB
19 KB
Document
General
Full URL
https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6815:41cb , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dd106d5782be4ef621c82cfdee1524a69a3a006ebd94c8682f33c4b2797675cd

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-cache, private
cf-cache-status
DYNAMIC
cf-ray
8e6c08b81aa3cec1-SJC
content-encoding
zstd
content-type
text/html; charset=UTF-8
date
Fri, 22 Nov 2024 21:32:47 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m8Os5mMB%2BOUfR%2FyD5ttypFtiMIEXYhwf2IHejvs6trWF%2FcC9D93Xl9TqRhz4JhsftI7mYoZ5LUupCzKaVUPJgBlk5T1E95OhwPtTnd%2FEqCRp1I9kGu%2FCH9PHay%2Fd5w%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=1701&sent=28&recv=25&lost=0&retrans=0&sent_bytes=23671&recv_bytes=2057&delivery_rate=10782978&cwnd=257&unsent_bytes=0&cid=f803ba679a0d179b&ts=82461&x=0" cfL4;desc="?proto=TCP&rtt=185555&sent=8&recv=11&lost=0&retrans=0&sent_bytes=4003&recv_bytes=2406&delivery_rate=21489&cwnd=35&unsent_bytes=0&cid=468ab76da782ed01&ts=718&x=0"
vary
accept-encoding
jquery-3.6.0.min.js
code.jquery.com/
87 KB
31 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: 3l.urj7z9q.com
URL: https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:200::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://3l.urj7z9q.com/

Response headers

content-encoding
gzip
etag
W/"28feccc0-15d9d"
age
2293493
x-cache
HIT, HIT
date
Fri, 22 Nov 2024 21:32:47 GMT
content-type
application/javascript; charset=utf-8
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
x-cache-hits
8, 997913
x-served-by
cache-lga21931-LGA, cache-fra-etou8220126-FRA
vary
Accept-Encoding
cache-control
public, max-age=31536000, stale-while-revalidate=604800
x-timer
S1732311168.527300,VS0,VE0
cross-origin-resource-policy
cross-origin
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
access-control-allow-origin
*
content-length
30875
server
nginx
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
93eb80dc01e920eaa7f23f998f67e5a5fc55e02b8e66bd3d8f5fef097d88565f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
userinter.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZ...
86 KB
86 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png
Requested by
Host: 3l.urj7z9q.com
URL: https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
fbbbc78e85dfa4f2b390e6dc2f3850d0f5247d16b5fd525093331572aa79ae84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://3l.urj7z9q.com/

Response headers

access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
etag
"v367e"
x-content-type-options
nosniff
expires
Sat, 23 Nov 2024 21:32:47 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
87859
date
Fri, 22 Nov 2024 21:32:47 GMT
x-xss-protection
0
content-type
image/png
vary
Origin
server
fife
content-disposition
inline;filename="userinter.png"
favicon.ico
3l.urj7z9q.com/
0
580 B
Other
General
Full URL
https://3l.urj7z9q.com/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3034::6815:41cb , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/

Response headers

cache-control
max-age=14400
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-encoding
zstd
cf-cache-status
HIT
age
13208
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=T4XTpXAwvvrmiVlqKBo9cMQQ1glMzsup3Rui5DXqffIcHZUd4PFXpESF34tsJzqasQPeXomc85Ss4wviIalqyM7Ji5mHCaN3vG7oFADUwGOikDdxzZ0jrAwwfQ1NjA%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8e6c08bfd9fecec1-SJC
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=TCP&rtt=2031&sent=470&recv=256&lost=0&retrans=2&sent_bytes=537798&recv_bytes=31426&delivery_rate=31146619&cwnd=273&unsent_bytes=0&cid=76135be702b4eb11&ts=417847&x=0", cfL4;desc="?proto=TCP&rtt=188430&sent=34&recv=23&lost=0&retrans=0&sent_bytes=24174&recv_bytes=3171&delivery_rate=105727&cwnd=47&unsent_bytes=0&cid=468ab76da782ed01&ts=1444&x=0"
date
Fri, 22 Nov 2024 21:32:47 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
server
cloudflare

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Google (Online)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| aXacpctyMG function| $ function| jQuery function| isNumber number| anwser function| loadCaptcha function| verifyCaptcha function| onCheckboxClick function| getRandomInt function| drawRandomLines function| drawRandomDots function| drawRandomEllipses function| drawCaptchaText function| drawCaptcha function| beCZrrnzFV

2 Cookies

Domain/Path Name / Value
3l.urj7z9q.com/ Name: XSRF-TOKEN
Value: eyJpdiI6InFFVFFmUVBmU092SWZiZ2tFZExVRUE9PSIsInZhbHVlIjoiRXR5c3hMZThhWHRzamRFQkxxa3NMdTRSV1o2MENZV2NTbVFSZHdBeEZST3k1amhvUHB4VjVVbHpPS2VaQnVreUMzL21tMlhHa2F5Sk5neDJoMnVHdklmdTFLdENQbktCa1k3cVpGVEVCTW5mS3kvUnBoeGlPaEJsdG1xQ2tEbWEiLCJtYWMiOiI0MDc2ZmI4MzQ2ZDM1NWM5NjFkYmM5ZDY5ZmNiMGMzMWY0OTA2M2EwOGE1OWM2ZjE0YzNlNzgyZWYzMTJjODBkIiwidGFnIjoiIn0%3D
3l.urj7z9q.com/ Name: laravel_session
Value: eyJpdiI6InFscmpUajE1WTBLUmZGUU9CemZMQXc9PSIsInZhbHVlIjoiNW1DOWhWbTRpUkF3Qm9mbU0rQWdhOXlmekR5bndpZXZNMUVuWC9vYUdFcWxmTGdIaitDVS9hS3pZanYxMmVpL2xaS1Bjbmp1QlIvdWExMFZValhtR1BRYmJaZldWQVFGTTVodWRXVlBqLzloS1VCUmltRGJQMTRjL3UzamJJa24iLCJtYWMiOiJkYjQ2NTA5MGY1YzY0ZmU0MzZjYjlmYjk3NDc4OTE5OWQyMTM5YzQyYTY1ZWNlZDM3OTczYTg4Yzg0NGNiYWQ3IiwidGFnIjoiIn0%3D

3 Console Messages

Source Level URL
Text
javascript warning URL: https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://3l.urj7z9q.com/EajOvOEBUFfP-mUx6d9kOCqrrWPg/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
network error URL: https://3l.urj7z9q.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()