funwavefoods.com
Open in
urlscan Pro
2a06:98c1:3120::3
Malicious Activity!
Public Scan
Effective URL: https://funwavefoods.com/wp/index.html
Submission: On August 22 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by WE1 on July 18th 2024. Valid for: 3 months.
This is the only time funwavefoods.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 3.223.2.102 3.223.2.102 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 5 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-223-2-102.compute-1.amazonaws.com
www.volunteermatters.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
funwavefoods.com
2 redirects
funwavefoods.com |
14 KB |
1 |
volunteermatters.net
1 redirects
www.volunteermatters.net |
190 B |
3 | 2 |
Domain | Requested by | |
---|---|---|
5 | funwavefoods.com | 2 redirects |
1 | www.volunteermatters.net | 1 redirects |
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
funwavefoods.com WE1 |
2024-07-18 - 2024-10-16 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://funwavefoods.com/wp/index.html
Frame ID: 7A50F254CF977AD2C46110DF3942B6F7
Requests: 3 HTTP requests in this frame
Frame:
https://funwavefoods.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/6790c32b9fc9/main.js
Frame ID: 8783CE436AC2C03CEB2460A2F87C67F3
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
U5dfdrsehgbPage URL History Show full URLs
-
https://www.volunteermatters.net/cas/logout?service=https://funwavefoods.com/wp/index.html
HTTP 302
https://funwavefoods.com/wp/index.html Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.volunteermatters.net/cas/logout?service=https://funwavefoods.com/wp/index.html
HTTP 302
https://funwavefoods.com/wp/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://funwavefoods.com/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://funwavefoods.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/6790c32b9fc9/main.js
- https://funwavefoods.com/favicon.ico HTTP 302
- https://funwavefoods.com/wp-content/uploads/2024/01/cropped-Untitled-design-32x32.png
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
index.html
funwavefoods.com/wp/ Redirect Chain
|
14 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
funwavefoods.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/6790c32b9fc9/ Frame 8783 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cropped-Untitled-design-32x32.png
funwavefoods.com/wp-content/uploads/2024/01/ Redirect Chain
|
880 B 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| getEmailFromUrl function| resetTimer function| updateTimer0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
funwavefoods.com
www.volunteermatters.net
2a06:98c1:3120::3
3.223.2.102
4376def97eb832a7f235f744632e97e51d056cfcdc7f8f05699b8f166ec0df55
4e9362d1257aff32a4ce933b053f6d3ef268150867653ca59f3d62447633090c
ade200721f1ff750742d938515c3c32f86d1358078bd97d70add5ff5fa8b8041
ff0407d4ec832e14fba9171bc288d0c481c956af888cba44382d147c0dbae6f9