kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev
Open in
urlscan Pro
2a06:98c1:3121::3
Public Scan
Submission Tags: phishing amex Search All
Submission: On April 26 via api from JP — Scanned from NL
Summary
TLS certificate: Issued by E1 on April 25th 2023. Valid for: 3 months.
This is the only time kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2 |
ASN13335 (CLOUDFLARENET, US)
kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
workers.dev
kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev |
652 B |
0 |
Failed
function sub() { [native code] }. Failed |
|
2 | 2 |
Domain | Requested by | |
---|---|---|
1 | kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev | |
0 | localhost Failed |
kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev
|
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pbsxp55s5968.workers.dev E1 |
2023-04-25 - 2023-07-24 |
3 months | crt.sh |
This page contains 1 frames:
Frame:
http://localhost/
Frame ID: 2D4811006E06DB2F58C208B281342D5F
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://bshysar.fartit.com/?p=TX1TX2rf+8zQ/cREXMkzs1NaUDhCblFMNHlIM3ZqN1N1Z2U5VWc9PQ==&m=000&t=000&ip=2001:1af8:5000:a026:5::2&language=nl-NL,nl;q=0.9&d=000 HTTP 302
- http://localhost/
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev/ |
195 B 652 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
localhost/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- localhost
- URL
- http://localhost/
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bshysar.fartit.com/ | Name: XSRF-TOKEN Value: eyJpdiI6IkdjQ2J3OVVnekNaU3RGdTVHZmE4S0E9PSIsInZhbHVlIjoieStOSTJ6Q2NOM3V1RU80cVJ3MmN6Q3lrXC9MRjJ0Umg0Y3NlQVNxd3ZrNjd6WEVLcWJoRDNNRUVJNU1KYlZrMGwiLCJtYWMiOiI0NDU4NTU5YWE4Mzk0MDY4MDg2MmZiNGEwOWRkMDY5YzdiOTdhY2Y0YTBjM2JiY2FjNDQzZmNkY2JiYjhmMWRkIn0%3D |
|
bshysar.fartit.com/ | Name: laravel_session Value: eyJpdiI6IlU5SlRLWWhwTFYwdnB6UmZ6em9xVGc9PSIsInZhbHVlIjoiVnpLUUVHN0xiZFZnUVJaRGZmYldFdFRkSGNoKzJHTk5jbXFPazFpOHptRk9UVGNoVDArMUNlc01naEJnY1wvd1RRZTB1eDdmeTdiUStTTlhWS3ErOVJmd2oxN0lEYlg5eGtMT1wvNmY1eVBjZCt3ZWRBalNkeTdPVVloZkpsM29CMiIsIm1hYyI6IjBkNGQzNzg0MTAyYjM2OTRkNTIzNDYyY2MxOTg2NTA1ZWYxMmMxM2FhZDM3NmQ3NGUyOTAzODc0ZThjODZlOTQifQ%3D%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kangaroo-52v9-xnsx.pbsxp55s5968.workers.dev
localhost
localhost
2a06:98c1:3121::3