frontier-alerts-e55d.yaydihardo.workers.dev
Open in
urlscan Pro
104.21.15.227
Malicious Activity!
Public Scan
Effective URL: https://frontier-alerts-e55d.yaydihardo.workers.dev/
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On May 18 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by GTS CA 1P5 on May 18th 2024. Valid for: 3 months.
This is the only time frontier-alerts-e55d.yaydihardo.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Frontier (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 104.21.15.227 104.21.15.227 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 108.181.20.37 108.181.20.37 | 40676 (AS40676) (AS40676) | |
1 | 104.26.12.205 104.26.12.205 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 199.224.64.214 199.224.64.214 | 3593 (FRONTIER-...) (FRONTIER-EPIX) | |
19 | 5 |
ASN3593 (FRONTIER-EPIX, US)
PTR: login.dlls.pa.frontiernet.net
login.frontier.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
catbox.moe
files.catbox.moe — Cisco Umbrella Rank: 174740 |
31 KB |
2 |
frontier.com
login.frontier.com — Cisco Umbrella Rank: 495793 |
2 KB |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2924 |
166 B |
1 |
workers.dev
frontier-alerts-e55d.yaydihardo.workers.dev |
196 KB |
19 | 4 |
Domain | Requested by | |
---|---|---|
6 | files.catbox.moe |
frontier-alerts-e55d.yaydihardo.workers.dev
files.catbox.moe |
2 | login.frontier.com | |
1 | api.ipify.org |
frontier-alerts-e55d.yaydihardo.workers.dev
|
1 | frontier-alerts-e55d.yaydihardo.workers.dev | |
19 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
yaydihardo.workers.dev GTS CA 1P5 |
2024-05-18 - 2024-08-16 |
3 months | crt.sh |
catbox.moe R3 |
2024-02-29 - 2024-05-29 |
3 months | crt.sh |
ipify.org GTS CA 1P5 |
2024-03-21 - 2024-06-19 |
3 months | crt.sh |
*.frontier.com Entrust Certification Authority - L1K |
2023-06-20 - 2024-07-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://frontier-alerts-e55d.yaydihardo.workers.dev/
Frame ID: 73F8740140A2DF710AC63EC331FB5AD8
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Frontier Mail LoginPage URL History Show full URLs
-
http://frontier-alerts-e55d.yaydihardo.workers.dev/
HTTP 307
https://frontier-alerts-e55d.yaydihardo.workers.dev/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://frontier-alerts-e55d.yaydihardo.workers.dev/
HTTP 307
https://frontier-alerts-e55d.yaydihardo.workers.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
frontier-alerts-e55d.yaydihardo.workers.dev/ Redirect Chain
|
1 MB 196 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9f4xrp.css
files.catbox.moe/ |
119 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2ep6wt.css
files.catbox.moe/ |
23 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
05qpu8.css
files.catbox.moe/ |
5 KB 949 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9vias1.css
files.catbox.moe/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sir4zv.css
files.catbox.moe/ |
293 B 641 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ru69bf.css
files.catbox.moe/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
31 B 166 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.woff2
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.woff2
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.woff2
files.catbox.moe/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.woff
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.woff
files.catbox.moe/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.woff
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.ttf
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.ttf
files.catbox.moe/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.ttf
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.svg
login.frontier.com/ftr-sys-theme/img/ |
1 KB 2 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.svg
login.frontier.com/ftr-sys-theme/img/ |
1 KB 0 |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.woff2
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.woff2
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/fonts/fontawesome-webfont.woff2?v=4.3.0
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.woff
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/fonts/fontawesome-webfont.woff?v=4.3.0
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.woff
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.ttf
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/fonts/fontawesome-webfont.ttf?v=4.3.0
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Frontier (Telecommunication)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| submit_login function| getIP function| _0x2f36 function| _0x36280 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
20 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.ipify.org
files.catbox.moe
frontier-alerts-e55d.yaydihardo.workers.dev
login.frontier.com
files.catbox.moe
104.21.15.227
104.26.12.205
108.181.20.37
199.224.64.214
08840c50d34bed078820ea796b47fb3bf3d9b69fbaf24c0ad23b380442013508
0a4f1c0678cd2a27ab20fa7efa25f37566d3fb652bd892621fb1deaa103c0119
0e3d7505193ba4ac56c5cd419a9fd4b427f36b6277f21e27a4983e8d0176cdbb
2b1209efca8c946f91cb79ef1daee82cf8127fa7dda8ae5b9ecb05f1ce3b0a05
48725a65fda90b2073c17025dee946f69c9ba9a443a58f0f339e82945f2ccc5a
541ac58217a8ade1a5e292a65a0661dc9db7a49ae13654943817a4fbc6761afd
789d31b318ee1762a7ed926a52a4f57099365d126e2ce2774f531ad035bbfe98
90347f17d0a98b959d30b8803a1ccdeee8af9d60c7105f45562b8337ea444bb7
a88c997815e64df95cd98c340c54d773e79795d366f265e5ed436429227520a4
d21ec90f5fefe07186ca7a2fa307effbdd39b405e84c66b6be9c35e049c4ed2b
d873bb05d0a5bd2244ea0af7e25ee80a5713117b7509a82818f400c5e8bb7053
e3169af49b7168dac89aa10b6e0493ddd4fd5b95118578d51e86930a5cb89690