rest-8do.pages.dev
Open in
urlscan Pro
172.66.47.25
Malicious Activity!
Public Scan
Submission Tags: @ecarlesi possiblethreat phishing aol Search All
Submission: On July 20 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by WE1 on July 20th 2024. Valid for: 3 months.
This is the only time rest-8do.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AOL (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 172.66.47.25 172.66.47.25 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.64.147.188 172.64.147.188 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 185.15.59.240 185.15.59.240 | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
6 | 3 |
ASN14907 (WIKIMEDIA, US)
PTR: upload-lb.esams.wikimedia.org
upload.wikimedia.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
pages.dev
rest-8do.pages.dev |
4 KB |
1 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 4162 |
18 KB |
1 |
fontawesome.com
pro.fontawesome.com — Cisco Umbrella Rank: 13950 |
29 KB |
6 | 3 |
Domain | Requested by | |
---|---|---|
4 | rest-8do.pages.dev |
rest-8do.pages.dev
|
1 | upload.wikimedia.org |
rest-8do.pages.dev
|
1 | pro.fontawesome.com |
rest-8do.pages.dev
|
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
rest-8do.pages.dev WE1 |
2024-07-20 - 2024-10-18 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-12-04 - 2025-01-03 |
a year | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2023-10-18 - 2024-10-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://rest-8do.pages.dev/robots.txt
Frame ID: 99F6B3B1B539AEA8BF3EC6EBB0838CA6
Requests: 6 HTTP requests in this frame
Screenshot
Page Title
AOLDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
robots.txt
rest-8do.pages.dev/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
pro.fontawesome.com/releases/v5.10.0/css/ |
153 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aolform.css
rest-8do.pages.dev/ |
1 KB 756 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aolstyle.css
rest-8do.pages.dev/ |
1 KB 781 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1280px-AOL_logo.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/b/b6/AOL_logo.svg/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
download_afD_icon.ico
rest-8do.pages.dev/images/ |
3 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AOL (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pro.fontawesome.com
rest-8do.pages.dev
upload.wikimedia.org
172.64.147.188
172.66.47.25
185.15.59.240
2af905d92cfd34b5413126a54f639da408166cbbcb54318e413ad5e10b5bf6ec
af505009aa72412941b81653a059b8aadd657a02e7de479bc3396c605e0e6299
b1fdb5abdc7b3c33cbac382862d4d585a107caf52fc8c4c4fd45dc55ac8dca9b
c1432d7d0a6005ba8002db7dba98cbadfc0aef86cf53a816734e8d8000b68252
d8e99959b03eb0ca71b34355770b82d27ff509a251d792595c8cf282ee6cc069