ingetco-invoice-portal-app.ap-south-1.linodeobjects.com Open in urlscan Pro
172.104.56.205  Malicious Activity! Public Scan

Submitted URL: https://applezein.net/telecom/verfy/
Effective URL: https://ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/invoice-portal.html
Submission: On January 18 via manual from IN — Scanned from IT

Summary

This website contacted 3 IPs in 3 countries across 2 domains to perform 5 HTTP transactions. The main IP is 172.104.56.205, located in Singapore, Singapore and belongs to AKAMAI-LINODE-AP Akamai Connected Cloud, SG. The main domain is ingetco-invoice-portal-app.ap-south-1.linodeobjects.com.
TLS certificate: Issued by R3 on January 2nd 2024. Valid for: 3 months.
This is the only time ingetco-invoice-portal-app.ap-south-1.linodeobjects.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Cloudflare (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 185.56.169.27 3242 (ASN-ITNET)
1 5 172.67.207.198 13335 (CLOUDFLAR...)
1 172.104.56.205 63949 (AKAMAI-LI...)
5 3
Domain Requested by
5 www.applezein.net 1 redirects www.applezein.net
1 ingetco-invoice-portal-app.ap-south-1.linodeobjects.com www.applezein.net
1 applezein.net 1 redirects
5 3

This site contains no links.

Subject Issuer Validity Valid
applezein.net
E1
2023-11-23 -
2024-02-21
3 months crt.sh
ap-south-1.linodeobjects.com
R3
2024-01-02 -
2024-04-01
3 months crt.sh

This page contains 1 frames:

Primary Page: https://ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/invoice-portal.html
Frame ID: EB813D814CE1669C6B4A1987B4D173BC
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://applezein.net/telecom/verfy/ HTTP 301
    https://www.applezein.net/telecom/verfy/ Page URL
  2. https://www.applezein.net/cdn-cgi/phish-bypass?atok=5vFkQqH.esE81aGybtgyDou7EcGqmfRXBRGkvGbq_cA-170555... HTTP 301
    https://www.applezein.net/telecom/verfy/ Page URL
  3. https://ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/invoice-portal.html Page URL

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

3
Subdomains

3
IPs

3
Countries

8 kB
Transfer

29 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://applezein.net/telecom/verfy/ HTTP 301
    https://www.applezein.net/telecom/verfy/ Page URL
  2. https://www.applezein.net/cdn-cgi/phish-bypass?atok=5vFkQqH.esE81aGybtgyDou7EcGqmfRXBRGkvGbq_cA-1705555648-0-%2Ftelecom%2Fverfy%2F HTTP 301
    https://www.applezein.net/telecom/verfy/ Page URL
  3. https://ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/invoice-portal.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://applezein.net/telecom/verfy/ HTTP 301
  • https://www.applezein.net/telecom/verfy/
Request Chain 3
  • https://www.applezein.net/cdn-cgi/phish-bypass?atok=5vFkQqH.esE81aGybtgyDou7EcGqmfRXBRGkvGbq_cA-1705555648-0-%2Ftelecom%2Fverfy%2F HTTP 301
  • https://www.applezein.net/telecom/verfy/

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
www.applezein.net/telecom/verfy/
Redirect Chain
  • https://applezein.net/telecom/verfy/
  • https://www.applezein.net/telecom/verfy/
4 KB
2 KB
Document
General
Full URL
https://www.applezein.net/telecom/verfy/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.207.198 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f70fc0a2da8205bcce402cdf3d3af9e2219835fde354ed84b65c01e7a6dc48d5
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36
accept-language
it-IT,it;q=0.9

Response headers

cf-ray
84746dd52baa59b9-MXP
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Thu, 18 Jan 2024 05:27:28 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=xwXOC2iNIz%2BhTIcMG42zGmkzFO5KILzdSCk0sz%2B2Awof9heKrM%2BU43WigdPvZ42RM8ittAiLVKupxfLnXpc8AQyuj5D8f8F0npOiK2S7of1T114dv3cbNlu7FGzEFR5qZ0zlcw%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
x-frame-options
SAMEORIGIN

Redirect headers

content-length
162
content-type
text/html
date
Thu, 18 Jan 2024 05:27:28 GMT
location
https://www.applezein.net/telecom/verfy/
server
nginx
cf.errors.css
www.applezein.net/cdn-cgi/styles/
24 KB
5 KB
Stylesheet
General
Full URL
https://www.applezein.net/cdn-cgi/styles/cf.errors.css
Requested by
Host: www.applezein.net
URL: https://www.applezein.net/telecom/verfy/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.207.198 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
it-IT,it;q=0.9
Referer
https://www.applezein.net/telecom/verfy/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

date
Thu, 18 Jan 2024 05:27:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 05 Jan 2024 17:29:47 GMT
server
cloudflare
etag
W/"65983c8b-5e44"
x-frame-options
DENY
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=7200, public
cf-ray
84746dd57bd159b9-MXP
expires
Thu, 18 Jan 2024 07:27:28 GMT
icon-exclamation.png
www.applezein.net/cdn-cgi/images/
452 B
542 B
Image
General
Full URL
https://www.applezein.net/cdn-cgi/images/icon-exclamation.png?1376755637
Requested by
Host: www.applezein.net
URL: https://www.applezein.net/cdn-cgi/styles/cf.errors.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.207.198 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
it-IT,it;q=0.9
Referer
https://www.applezein.net/cdn-cgi/styles/cf.errors.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

date
Thu, 18 Jan 2024 05:27:28 GMT
x-content-type-options
nosniff
last-modified
Fri, 05 Jan 2024 17:29:47 GMT
server
cloudflare
etag
"65983c8b-1c4"
x-frame-options
DENY
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=7200, public
accept-ranges
bytes
cf-ray
84746dd5cbf559b9-MXP
content-length
452
expires
Thu, 18 Jan 2024 07:27:28 GMT
/
www.applezein.net/telecom/verfy/
Redirect Chain
  • https://www.applezein.net/cdn-cgi/phish-bypass?atok=5vFkQqH.esE81aGybtgyDou7EcGqmfRXBRGkvGbq_cA-1705555648-0-%2Ftelecom%2Fverfy%2F
  • https://www.applezein.net/telecom/verfy/
259 B
558 B
Document
General
Full URL
https://www.applezein.net/telecom/verfy/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.207.198 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PleskLin
Resource Hash

Request headers

Referer
https://www.applezein.net/telecom/verfy/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36
accept-language
it-IT,it;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
84746df00ab159b9-MXP
content-encoding
br
content-type
text/html
date
Thu, 18 Jan 2024 05:27:33 GMT
last-modified
Tue, 16 Jan 2024 04:07:54 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6pDaAKq6FMZYzGEnGY7lhTPR0rlwz4OJSebu9zQmie9hkxECvyZa0z8uygyP3%2BzpQR2PJZkaZwoIEOwciSi%2Bxe1CPtVZe1QqYE1lcBkncBsqrlp6a3lsulelp5uIfK%2Fn4Qik2A%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
x-accel-version
0.01
x-cache-status
BYPASS
x-powered-by
PleskLin

Redirect headers

cache-control
private, no-cache
cf-ray
84746defca7259b9-MXP
content-length
167
content-type
text/html
date
Thu, 18 Jan 2024 05:27:33 GMT
location
https://www.applezein.net/telecom/verfy/
server
cloudflare
x-content-type-options
nosniff
x-frame-options
DENY
Primary Request invoice-portal.html
ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/
244 B
476 B
Document
General
Full URL
https://ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/invoice-portal.html
Requested by
Host: www.applezein.net
URL: https://www.applezein.net/telecom/verfy/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.104.56.205 Singapore, Singapore, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
osproxy6-sin1.linode.com
Software
/
Resource Hash
020eecb065fceb46c36e73c7d4fc04e6969d2d90f56622d84254795810847c9f

Request headers

Referer
https://www.applezein.net/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36
accept-language
it-IT,it;q=0.9

Response headers

Accept-Ranges
bytes
Connection
keep-alive
Content-Length
244
Content-Type
application/xml
Date
Thu, 18 Jan 2024 05:27:34 GMT
x-amz-request-id
tx0000076afd3f4484b2429-0065a8b6c6-182011d4-default
truncated
/
112 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7a9ebfb7c3ecda0476f5c7350a344469673eb940d967b3bf40054fe667570f0a

Request headers

accept-language
it-IT,it;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Cloudflare (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
.www.applezein.net/ Name: __cf_mw_byp
Value: 5vFkQqH.esE81aGybtgyDou7EcGqmfRXBRGkvGbq_cA-1705555648-0-/telecom/verfy/

1 Console Messages

Source Level URL
Text
network error URL: https://ingetco-invoice-portal-app.ap-south-1.linodeobjects.com/invoice-portal.html#
Message:
Failed to load resource: the server responded with a status of 403 (Forbidden)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN