bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com
Open in
urlscan Pro
149.137.129.254
Malicious Activity!
Public Scan
Submission: On July 01 via manual from US — Scanned from US
Summary
TLS certificate: Issued by R3 on April 28th 2022. Valid for: 3 months.
This is the only time bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 149.137.129.254 149.137.129.254 | 40401 (BACKBLAZE) (BACKBLAZE) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:80f::200a | 15169 (GOOGLE) (GOOGLE) | |
6 | 2606:4700:303... 2606:4700:3037::ac43:d935 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 4 |
ASN40401 (BACKBLAZE, US)
PTR: s3.us-west-004.backblazeb2.com
bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
bpxion.com
bpxion.com |
124 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 307 |
30 KB |
1 |
backblazeb2.com
bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com |
74 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
6 | bpxion.com |
bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com
|
1 | ajax.googleapis.com |
bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com
|
1 | bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com | |
14 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2022-04-28 - 2022-07-27 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-06-06 - 2022-08-29 |
3 months | crt.sh |
*.bpxion.com E1 |
2022-06-16 - 2022-09-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com/index.html
Frame ID: 907E05AFF27FFDF25EE3945DE56E4A82
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com/ |
74 KB 74 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
bpxion.com/email-list/arrrrrrrr3/assets/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.png
bpxion.com/email-list/arrrrrrrr3/assets/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
outlook.svg
bpxion.com/email-list/arrrrrrrr3/assets/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office.svg
bpxion.com/email-list/arrrrrrrr3/assets/ |
1 KB 950 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
other.png
bpxion.com/email-list/arrrrrrrr3/assets/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
bpxion.com/email-list/arrrrrrrr3/assets/ |
91 KB 91 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.woff2
bpxion.com/email-list/arrrrrrrr3/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI.woff2
bpxion.com/email-list/arrrrrrrr3/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.woff
bpxion.com/email-list/arrrrrrrr3/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI-SemiBold.ttf
bpxion.com/email-list/arrrrrrrr3/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI.woff
bpxion.com/email-list/arrrrrrrr3/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
SegoeUI.ttf
bpxion.com/email-list/arrrrrrrr3/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- bpxion.com
- URL
- https://bpxion.com/email-list/arrrrrrrr3/assets/SegoeUI-SemiBold.woff2
- Domain
- bpxion.com
- URL
- https://bpxion.com/email-list/arrrrrrrr3/assets/SegoeUI.woff2
- Domain
- bpxion.com
- URL
- https://bpxion.com/email-list/arrrrrrrr3/assets/SegoeUI-SemiBold.woff
- Domain
- bpxion.com
- URL
- https://bpxion.com/email-list/arrrrrrrr3/assets/SegoeUI-SemiBold.ttf
- Domain
- bpxion.com
- URL
- https://bpxion.com/email-list/arrrrrrrr3/assets/SegoeUI.woff
- Domain
- bpxion.com
- URL
- https://bpxion.com/email-list/arrrrrrrr3/assets/SegoeUI.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| _0x21dd function| _0x584b object| Zlib function| templatePage function| $ function| jQuery function| window_opener_xc function| get_extra_data0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
14 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bpxion.com
bronchitic-incandent-ungallantness.s3.us-west-004.backblazeb2.com
bpxion.com
149.137.129.254
2606:4700:3037::ac43:d935
2607:f8b0:4006:80f::200a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