f005.backblazeb2.com
Open in
urlscan Pro
149.137.136.16
Malicious Activity!
Public Scan
Effective URL: https://f005.backblazeb2.com/file/loyd32/index.html
Submission Tags: @phish_report
Submission: On November 26 via api from FI — Scanned from NL
Summary
TLS certificate: Issued by R10 on November 15th 2024. Valid for: 3 months.
This is the only time f005.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: RAM Couriers (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 188.114.97.3 188.114.97.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 149.137.136.16 149.137.136.16 | 40401 (BACKBLAZE) (BACKBLAZE) | |
8 | 2 |
ASN40401 (BACKBLAZE, US)
PTR: f005.backblazeb2.com
f005.backblazeb2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
backblazeb2.com
f005.backblazeb2.com — Cisco Umbrella Rank: 225313 |
1 MB |
1 |
clipr.cc
1 redirects
www.clipr.cc |
751 B |
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | f005.backblazeb2.com |
f005.backblazeb2.com
|
1 | www.clipr.cc | 1 redirects |
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
portal.ram.co.za |
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R10 |
2024-11-15 - 2025-02-13 |
3 months | crt.sh |
This page contains 6 frames:
Primary Page:
https://f005.backblazeb2.com/file/loyd32/index.html
Frame ID: FDAF30FE445760FA3CABDA484334DD10
Requests: 14 HTTP requests in this frame
Frame:
https://f005.backblazeb2.com/file/loyd32/pag1_files/saved_resource.html
Frame ID: D267B3740104F4257808AA308AF4CEE4
Requests: 1 HTTP requests in this frame
Frame:
https://f005.backblazeb2.com/file/loyd32/pag1_files/saved_resource(1).html
Frame ID: D09169880B81BA1ED444A7BF8FFB9CF4
Requests: 1 HTTP requests in this frame
Frame:
https://f005.backblazeb2.com/file/loyd32/pag1_files/saved_resource(2).html
Frame ID: C9EAE7A480EF1FD7D571E70FF315C516
Requests: 1 HTTP requests in this frame
Frame:
https://f005.backblazeb2.com/file/loyd32/pag1_files/saved_resource(3).html
Frame ID: 304E0BF48D1380FAD1F5B3C2742E05BB
Requests: 1 HTTP requests in this frame
Frame:
https://f005.backblazeb2.com/file/loyd32/pag1_files/saved_resource(4).html
Frame ID: 07AA8B51976FF332237DFA0246B7FE35
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
RAM - Confirm & PaymentPage URL History Show full URLs
-
https://www.clipr.cc/8wTXx
HTTP 302
https://f005.backblazeb2.com/file/loyd32/index.html Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Business Portal
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.clipr.cc/8wTXx
HTTP 302
https://f005.backblazeb2.com/file/loyd32/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
f005.backblazeb2.com/file/loyd32/ Redirect Chain
|
1 MB 1 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
reset.min.html
f005.backblazeb2.com/file/loyd32/pag1_files/ |
0 0 |
Stylesheet
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.html
f005.backblazeb2.com/file/loyd32/pag1_files/ |
0 0 |
Stylesheet
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
28 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource.html
f005.backblazeb2.com/file/loyd32/pag1_files/ Frame D267 |
94 B 344 B |
Document
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource(1).html
f005.backblazeb2.com/file/loyd32/pag1_files/ Frame D091 |
0 0 |
Document
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource(2).html
f005.backblazeb2.com/file/loyd32/pag1_files/ Frame C9EA |
94 B 344 B |
Document
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
144 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
145 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
123 KB 123 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
154 KB 154 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
33 KB 33 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
28 KB 28 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
27 KB 27 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
22 KB 22 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource(3).html
f005.backblazeb2.com/file/loyd32/pag1_files/ Frame 304E |
94 B 344 B |
Document
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource(4).html
f005.backblazeb2.com/file/loyd32/pag1_files/ Frame 07AA |
94 B 344 B |
Document
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: RAM Couriers (Transportation)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| 3 object| 4 function| onReady function| setVisible function| savepage_ShadowLoader function| _0xea24 function| _0x5f3ec4 function| _0x3ef4f6 function| _0x3216 function| _0x19c510 function| _0x439126 function| _0x2a9fe50 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=63072000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
f005.backblazeb2.com
www.clipr.cc
149.137.136.16
188.114.97.3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