pub-262f714d04e74664b859b1717330a4de.r2.dev
Open in
urlscan Pro
104.18.2.35
Malicious Activity!
Public Scan
Effective URL: https://pub-262f714d04e74664b859b1717330a4de.r2.dev/vendorupdate.html
Submission: On August 15 via api from US — Scanned from IT
Summary
TLS certificate: Issued by E6 on August 1st 2024. Valid for: 3 months.
This is the only time pub-262f714d04e74664b859b1717330a4de.r2.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online) Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 77.237.235.224 77.237.235.224 | 51167 (CONTABO) (CONTABO) | |
4 | 104.18.2.35 104.18.2.35 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 104.18.24.163 104.18.24.163 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 185.15.59.240 185.15.59.240 | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
1 | 151.101.2.137 151.101.2.137 | 54113 (FASTLY) (FASTLY) | |
1 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 142.250.185.234 142.250.185.234 | 15169 (GOOGLE) (GOOGLE) | |
20 | 8 |
ASN14907 (WIKIMEDIA, US)
PTR: upload-lb.esams.wikimedia.org
upload.wikimedia.org |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
ASN15169 (GOOGLE, US)
PTR: fra16s53-in-f10.1e100.net
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
gyazo.com
i.gyazo.com — Cisco Umbrella Rank: 71931 |
431 KB |
4 |
r2.dev
pub-262f714d04e74664b859b1717330a4de.r2.dev |
37 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1832 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 4508 |
31 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
7 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
24 KB |
1 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 4162 |
6 KB |
1 |
lgyb1.shop
1 redirects
er.lgyb1.shop |
290 B |
0 |
microsoft.com
Failed
learn.microsoft.com — Cisco Umbrella Rank: 20571 Failed |
|
0 |
keycdn.com
Failed
opensource.keycdn.com Failed |
|
20 | 10 |
Domain | Requested by | |
---|---|---|
7 | i.gyazo.com |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
4 | pub-262f714d04e74664b859b1717330a4de.r2.dev |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | stackpath.bootstrapcdn.com |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | ajax.googleapis.com |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | maxcdn.bootstrapcdn.com |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | cdnjs.cloudflare.com |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | code.jquery.com |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | upload.wikimedia.org |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
1 | er.lgyb1.shop | 1 redirects |
0 | learn.microsoft.com Failed | |
0 | opensource.keycdn.com Failed |
pub-262f714d04e74664b859b1717330a4de.r2.dev
|
20 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.r2.dev E6 |
2024-08-01 - 2024-10-30 |
3 months | crt.sh |
gyazo.com WE1 |
2024-07-30 - 2024-10-28 |
3 months | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2023-10-18 - 2024-10-16 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-07-31 - 2024-10-29 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-07-23 - 2024-10-21 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pub-262f714d04e74664b859b1717330a4de.r2.dev/vendorupdate.html
Frame ID: 068A1FF378F305744F597399E291E38B
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
AdobePage URL History Show full URLs
-
https://er.lgyb1.shop/
HTTP 301
https://pub-262f714d04e74664b859b1717330a4de.r2.dev/vendorupdate.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://er.lgyb1.shop/
HTTP 301
https://pub-262f714d04e74664b859b1717330a4de.r2.dev/vendorupdate.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 17- https://docs.com/1673155405_Images/favicon.ico HTTP 301
- https://www.docs.com/1673155405_Images/favicon.ico HTTP 301
- https://learn.microsoft.com/ HTTP 302
- https://learn.microsoft.com/it-it/
- https://docs.com/1673155405_Images/favicon.ico HTTP 301
- https://www.docs.com/1673155405_Images/favicon.ico HTTP 301
- https://learn.microsoft.com/
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
vendorupdate.html
pub-262f714d04e74664b859b1717330a4de.r2.dev/ Redirect Chain
|
27 KB 27 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
font-awesome.min.css
opensource.keycdn.com/fontawesome/4.6.3/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2e6a7c17a90b17b5ff2019543193b4e9.jpg
i.gyazo.com/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
200px-AOL_Eraser.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/a/a2/AOL_Eraser.svg/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
060e9d726f9bb555eb94f15474b6fd65.png
i.gyazo.com/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8b09deab09d58e1261bbb6cbc5e89559.jpg
i.gyazo.com/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1cd4efa81de96d9776b7cdb887745acf.gif
i.gyazo.com/ |
6 KB 6 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c2bddd4e69aba81bcf138fa9028df5fb.png
i.gyazo.com/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8922f8c4f3b73b259c84ee57c2dec1ee.png
i.gyazo.com/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
pub-262f714d04e74664b859b1717330a4de.r2.dev/images/ |
9 KB 9 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d2a6d4a5caf16f926e6b820798a6fc00.png
i.gyazo.com/ |
375 KB 376 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
et-line.woff
pub-262f714d04e74664b859b1717330a4de.r2.dev/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
et-line.ttf
pub-262f714d04e74664b859b1717330a4de.r2.dev/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
learn.microsoft.com/it-it/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
learn.microsoft.com/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- opensource.keycdn.com
- URL
- https://opensource.keycdn.com/fontawesome/4.6.3/font-awesome.min.css
- Domain
- learn.microsoft.com
- URL
- https://learn.microsoft.com/it-it/
- Domain
- learn.microsoft.com
- URL
- https://learn.microsoft.com/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online) Adobe (Consumer)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Popper object| bootstrap object| _0x1086 string| f string| rc string| rdrt string| domain_redirect1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
i.gyazo.com/ | Name: Gyazo_cfwoker Value: i |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
er.lgyb1.shop
i.gyazo.com
learn.microsoft.com
maxcdn.bootstrapcdn.com
opensource.keycdn.com
pub-262f714d04e74664b859b1717330a4de.r2.dev
stackpath.bootstrapcdn.com
upload.wikimedia.org
learn.microsoft.com
opensource.keycdn.com
104.17.24.14
104.18.10.207
104.18.2.35
104.18.24.163
142.250.185.234
151.101.2.137
185.15.59.240
77.237.235.224
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0cf605381ef8acee469f427fb203acf2e5fedf6056208215be170bf7421e3433
1137cadbe746090853f7d2fb7ac45fb577193ea2560d6cdf29af273d6515c3b3
150635dc2c0d83b291bca970628370ff2a04c760c3bb7c1ff52aee296b6287d5
2f71bea7601b970d07eea91af38bcee8b1c9fc197b5f85cbe9bae3b9f2b705c5
3f028b5949911c652f1ac727f5c2c8e30d7ae79a7de47a6e392a15073fa18f56
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
844abe80bf4590a25984c4bf885fc27d386819df20022aacd7ed8c96a159c831
91a90597b2e95f89fdcef1fb71c3eef1dd6a9e849ccd4a68dae3a94ceb8a7c8b
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
b4e69a741ce321048d31f860201d1312b9fe88db6fe027f0534a5e72bc4ea7a4
b7ead6c56b3245b1bc31fff1b4c97e4e0190dae25116d9f04dcaca0ae8b30f4a
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
eb62bef03b5f56fbc3892ff71d95c1cad9c8bc8b25976493251f55294da6211d