xn--trezo-9bb.com
Open in
urlscan Pro
Puny
trezoĆ.com IDN
2606:4700:30::681c:1c6a
Malicious Activity!
Public Scan
Submission: On September 01 via api from DE
Summary
This is the only time xn--trezo-9bb.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Trezor (Crypto)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 2606:4700:30:... 2606:4700:30::681c:1c6a | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
xn--trezo-9bb.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
xn--trezo-9bb.com
xn--trezo-9bb.com |
11 MB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | xn--trezo-9bb.com |
xn--trezo-9bb.com
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
shop.trezor.io |
wiki.trezor.io |
trezor.io |
blog.trezor.io |
one.xn--trezo-9bb.com |
model.xn--trezo-9bb.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://xn--trezo-9bb.com/
Frame ID: E96E7EB48228B3AFDFF59A8AF1DE74D9
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
6 Outgoing links
These are links going to different origins than the main page.
Title: Shop
Search URL Search Domain Scan URL
Title: Wiki
Search URL Search Domain Scan URL
Title: Support
Search URL Search Domain Scan URL
Title: Blog
Search URL Search Domain Scan URL
Title: Continue to wallet
Search URL Search Domain Scan URL
Title: Continue to wallet
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
xn--trezo-9bb.com/ |
13 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
xn--trezo-9bb.com/index_files/ |
103 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
xn--trezo-9bb.com/index_files/ |
103 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendors.js
xn--trezo-9bb.com/index_files/ |
134 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trezor-logo.png
xn--trezo-9bb.com/index_files/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
T1.png
xn--trezo-9bb.com/index_files/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
T2.png
xn--trezo-9bb.com/index_files/ |
58 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.png
xn--trezo-9bb.com/index_files/ |
320 KB 321 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.html
xn--trezo-9bb.com/index_files/bootstrap/ |
1 KB 950 B |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safari.html
xn--trezo-9bb.com/index_files/custom/ |
1 KB 950 B |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trezor-extrabold.woff
xn--trezo-9bb.com/index_files/ |
74 KB 75 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trezor-bold.woff
xn--trezo-9bb.com/index_files/ |
75 KB 75 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
roboto-v18-latin-regular.woff2
xn--trezo-9bb.com/index_files/ |
15 KB 15 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
T1_hologram.mp4
xn--trezo-9bb.com/index_files/ |
8 MB 8 MB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TT_hologram.mp4
xn--trezo-9bb.com/index_files/ |
2 MB 2 MB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Trezor (Crypto)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| $jscomp function| canUseWebP function| raf function| $ function| jQuery object| html5 object| Modernizr function| ClipboardJS object| echo function| Cookies1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.xn--trezo-9bb.com/ | Name: __cfduid Value: db94e5bd25c329e634ee1550fc19e4c361567362197 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
xn--trezo-9bb.com
2606:4700:30::681c:1c6a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