howfv.smashballs.lat
Open in
urlscan Pro
2606:4700:3037::ac43:dbce
Malicious Activity!
Public Scan
Effective URL: https://howfv.smashballs.lat/mmlom/mnfbu/zhpv/yklr?c9179bb655213334bd5633c41510ea43
Submission Tags: phishing
Submission: On September 05 via api from US — Scanned from CA
Summary
TLS certificate: Issued by WE1 on August 28th 2024. Valid for: 3 months.
This is the only time howfv.smashballs.lat was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.239.221.226 52.239.221.226 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 194.31.223.186 194.31.223.186 | 39521 (TNGNET) (TNGNET) | |
1 1 | 2606:4700:303... 2606:4700:3032::6815:921 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 2606:4700:303... 2606:4700:3037::ac43:dbce | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3036::6815:1b98 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3036::ac43:961e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700:303... 2606:4700:3035::6815:6008 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
22 | 6 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
naminsadyeffctr.blob.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
smashballs.lat
howfv.smashballs.lat |
367 KB |
4 |
trk-elevostra.com
trk-elevostra.com — Cisco Umbrella Rank: 357103 event.trk-elevostra.com — Cisco Umbrella Rank: 369321 |
3 KB |
1 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1950 |
426 KB |
1 |
globalline.site
1 redirects
globalline.site |
662 B |
1 |
overdonerun.com
overdonerun.com |
415 B |
1 |
windows.net
naminsadyeffctr.blob.core.windows.net |
564 B |
22 | 6 |
Domain | Requested by | |
---|---|---|
15 | howfv.smashballs.lat |
overdonerun.com
howfv.smashballs.lat |
3 | event.trk-elevostra.com |
trk-elevostra.com
|
1 | trk-elevostra.com |
howfv.smashballs.lat
|
1 | use.fontawesome.com |
howfv.smashballs.lat
|
1 | globalline.site | 1 redirects |
1 | overdonerun.com |
naminsadyeffctr.blob.core.windows.net
|
1 | naminsadyeffctr.blob.core.windows.net | |
22 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blob.core.windows.net Microsoft Azure RSA TLS Issuing CA 04 |
2024-08-23 - 2025-08-18 |
a year | crt.sh |
overdonerun.com R11 |
2024-07-25 - 2024-10-23 |
3 months | crt.sh |
smashballs.lat WE1 |
2024-08-28 - 2024-11-26 |
3 months | crt.sh |
use.fontawesome.com Cloudflare Inc ECC CA-3 |
2023-10-12 - 2024-10-10 |
a year | crt.sh |
trk-elevostra.com WE1 |
2024-08-11 - 2024-11-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://howfv.smashballs.lat/mmlom/mnfbu/zhpv/yklr?c9179bb655213334bd5633c41510ea43
Frame ID: 24417245E0270EC0CA0A7F88B18A72C4
Requests: 21 HTTP requests in this frame
Screenshot
Page Title
Survey RewardsPage URL History Show full URLs
- https://naminsadyeffctr.blob.core.windows.net/naminsadyeffctr/url.html Page URL
- https://overdonerun.com/0/0/0/5d3e3f19af19c1ea9c2f07ce979ac9e1/60 Page URL
-
https://globalline.site/?id=271&s1=351633&s2=1225096865&s3=7089&p=us5dcksweps7b
HTTP 302
https://howfv.smashballs.lat/mmlom/mnfbu/zhpv/yklr?c9179bb655213334bd5633c41510ea43 Page URL
Detected technologies
animate.css (Web Frameworks) ExpandDetected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://naminsadyeffctr.blob.core.windows.net/naminsadyeffctr/url.html Page URL
- https://overdonerun.com/0/0/0/5d3e3f19af19c1ea9c2f07ce979ac9e1/60 Page URL
-
https://globalline.site/?id=271&s1=351633&s2=1225096865&s3=7089&p=us5dcksweps7b
HTTP 302
https://howfv.smashballs.lat/mmlom/mnfbu/zhpv/yklr?c9179bb655213334bd5633c41510ea43 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
url.html
naminsadyeffctr.blob.core.windows.net/naminsadyeffctr/ |
161 B 564 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
60
overdonerun.com/0/0/0/5d3e3f19af19c1ea9c2f07ce979ac9e1/ |
142 B 415 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
yklr
howfv.smashballs.lat/mmlom/mnfbu/zhpv/ Redirect Chain
|
28 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
howfv.smashballs.lat/master/us190/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
animate.min.css
howfv.smashballs.lat/master/us190/ |
70 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_modal.css
howfv.smashballs.lat/master/terms/css/ |
856 B 803 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.js
use.fontawesome.com/releases/v5.15.4/js/ |
1 MB 426 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
datehead.js
howfv.smashballs.lat/master/us190/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
msg.js
howfv.smashballs.lat/inc/ |
943 B 927 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.js
howfv.smashballs.lat/master/us190/ |
11 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_modal.js
howfv.smashballs.lat/master/terms/js/ |
1 KB 937 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v9e118mez8
trk-elevostra.com/scripts/push/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
dic.jpg
howfv.smashballs.lat/master/us190/ |
178 KB 178 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.png
howfv.smashballs.lat/master/us190/ |
74 KB 74 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flaglogo.png
howfv.smashballs.lat/master/us190/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
prize983.png
howfv.smashballs.lat/master/us190/ |
73 KB 74 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f_guarantee.png
howfv.smashballs.lat/master/us190/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f_secure_1.png
howfv.smashballs.lat/master/us190/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
howfv.smashballs.lat/ |
0 516 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)44 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| datehax function| datenhax function| datenhay function| startTimer function| change object| MYCALL string| s1 string| s2 string| esource string| pshpub string| pshdomain object| answers number| lastQnum function| toNext object| states object| dones object| loadImg object| loadBgCol function| drawloader number| qn number| dsq object| modal object| modalContent object| termsText object| btn object| span function| urlBase64ToUint8Array function| pullUrlParams function| push_subscribe function| push_subscribe_promise function| setIfNull function| logPushEvent function| push_unsubscribe function| push_init function| setSessionId function| setUtm function| getSessionId function| getUrlVars function| getDomainName function| getStore function| setAttributes object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
overdonerun.com/ | Name: uid7089 Value: 1225096865-20240905102303-18266311169120bbc4ddc49223a57135-4046 |
|
globalline.site/ | Name: PHPSESSID Value: 24068d066e50b70df6846ea39f3703f8 |
|
howfv.smashballs.lat/ | Name: PHPSESSID Value: 884cafd0ef785b7a2471dc7cd0235875 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
event.trk-elevostra.com
globalline.site
howfv.smashballs.lat
naminsadyeffctr.blob.core.windows.net
overdonerun.com
trk-elevostra.com
use.fontawesome.com
194.31.223.186
2606:4700:3032::6815:921
2606:4700:3035::6815:6008
2606:4700:3036::6815:1b98
2606:4700:3036::ac43:961e
2606:4700:3037::ac43:dbce
52.239.221.226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