stsfashiondb.com
Open in
urlscan Pro
2606:4700:3035::6812:32f6
Malicious Activity!
Public Scan
Submission: On January 08 via automatic, source openphish
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on October 1st 2020. Valid for: a year.
This is the only time stsfashiondb.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 15 | 2606:4700:303... 2606:4700:3035::6812:32f6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
stsfashiondb.com
2 redirects
stsfashiondb.com |
657 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
15 | stsfashiondb.com |
2 redirects
stsfashiondb.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-01 - 2021-10-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://stsfashiondb.com/xdr/op/bo/xe/dd/
Frame ID: E2B4F1F9153E541B1E3F58DC40E9BADD
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://stsfashiondb.com/xdr/op/bo/xe/dd
HTTP 301
http://stsfashiondb.com/xdr/op/bo/xe/dd/ HTTP 301
https://stsfashiondb.com/xdr/op/bo/xe/dd/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://stsfashiondb.com/xdr/op/bo/xe/dd
HTTP 301
http://stsfashiondb.com/xdr/op/bo/xe/dd/ HTTP 301
https://stsfashiondb.com/xdr/op/bo/xe/dd/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
stsfashiondb.com/xdr/op/bo/xe/dd/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
stsfashiondb.com/xdr/op/bo/xe/dd/styles/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkbox.css
stsfashiondb.com/xdr/op/bo/xe/dd/styles/ |
1 KB 755 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
stsfashiondb.com/xdr/op/bo/xe/dd/styles/ |
71 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
stsfashiondb.com/xdr/op/bo/xe/dd/js/ |
281 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pdf.png
stsfashiondb.com/xdr/op/bo/xe/dd/images/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
excel.png
stsfashiondb.com/xdr/op/bo/xe/dd/images/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
log.png
stsfashiondb.com/xdr/op/bo/xe/dd/images/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spinner.gif
stsfashiondb.com/xdr/op/bo/xe/dd/images/ |
350 KB 350 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
stsfashiondb.com/xdr/op/bo/xe/dd/js/ |
2 KB 770 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-brands-400.woff2
stsfashiondb.com/xdr/op/bo/xe/dd/webfonts/ |
76 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
stsfashiondb.com/xdr/op/bo/xe/dd/webfonts/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
stsfashiondb.com/xdr/op/bo/xe/dd/webfonts/ |
78 KB 79 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.stsfashiondb.com/ | Name: __cfduid Value: d5e36b723e6ca143e834900f8938ddb171610111656 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
stsfashiondb.com
2606:4700:3035::6812:32f6
0bf1b8d8ac1b4ef0caea0db8cbe1b6a35f8a84a2f5fffa2421936cc11a1a91fc
2f27e3493b2e2f88ea00a21198740938a07a1a202ceab6105793f0c228dedbe1
416a3b2c3bf16d64f6b5b6d0f7b079df2267614dd6847fc2f3271b4409233c37
530cb4c29b444dc89dd73a4e0812f803be98d3448a48edca8aafdbc55a0b97eb
5eedb987a0d26a60527854460e67bb0762de152f45b5be580de5aa21e524d309
7253f301aa0fd63fad4935c51eba121f766a630a9f47b25d24cd7b281e3ca943
73257fb51b4e9c849a46820ae181173030b1a15d1c5a597f5840e353b438b33a
ab96691d78536247ca2ab64aac5af744cf699926fa30d393ae859c9fa803b42c
b6a4e4eb69c0c7601ff58f4546567810128008e2cb99dc08c22bba4093b4a722
d89a90eccb388e8a5ef0fa69eda8cc1333a24312fb7fb9b00ed72063d0d71965
de5fb40e0689f154902213527781c2fb83cddcbf8f622a1384f1e2a7e7693b21
e98ae3ff936b4723cd8a2377d2c549a667ce87e81201ec4995cc01bd374c1288
f197d9da74ec12bcfeb42f4ace83d2b31b2dd06c70a60aa8f9d89c8f58efa9e3