avaniejoshi.com
Open in
urlscan Pro
103.8.127.157
Malicious Activity!
Public Scan
Effective URL: https://avaniejoshi.com/b/auth/xN9dG1/login.php?id=48223518
Submission: On October 08 via api from NL — Scanned from NL
Summary
TLS certificate: Issued by R3 on October 5th 2023. Valid for: 3 months.
This is the only time avaniejoshi.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2600:9000:214... 2600:9000:214f:d400:19:1477:f380:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
2 14 | 103.8.127.157 103.8.127.157 | 18229 (CTRLS-AS-...) (CTRLS-AS-IN CtrlS) | |
2 | 2606:4700::68... 2606:4700::6810:5814 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
2 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:82b::2003 | 15169 (GOOGLE) (GOOGLE) | |
19 | 6 |
ASN16509 (AMAZON-02, US)
payment-failed.intercom-mail.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
avaniejoshi.com
2 redirects
avaniejoshi.com |
46 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 250 |
413 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 373 |
48 KB |
1 |
gstatic.com
fonts.gstatic.com |
48 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 49 |
1 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 925 |
31 KB |
1 |
intercom-mail.com
1 redirects
payment-failed.intercom-mail.com |
3 KB |
19 | 7 |
Domain | Requested by | |
---|---|---|
14 | avaniejoshi.com |
2 redirects
avaniejoshi.com
|
2 | cdnjs.cloudflare.com |
avaniejoshi.com
|
2 | cdn.jsdelivr.net |
avaniejoshi.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
avaniejoshi.com
|
1 | code.jquery.com |
avaniejoshi.com
|
1 | payment-failed.intercom-mail.com | 1 redirects |
19 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
avaniejoshi.com R3 |
2023-10-05 - 2024-01-03 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-02 - 2024-05-01 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-09-18 - 2023-12-11 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-09-18 - 2023-12-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://avaniejoshi.com/b/auth/xN9dG1/login.php?id=48223518
Frame ID: C6ACD0627B1CCC0972C8CE06DA1FAD33
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Manage your Apple IDPage URL History Show full URLs
-
http://payment-failed.intercom-mail.com/via/e?ob=X5NPiPLW6%2BYWTY2cqL75S76hNxDggDBZViOXbvjerGI%3D&h=3aa6faf1bce00cc2...
HTTP 307
https://payment-failed.intercom-mail.com/via/e?ob=X5NPiPLW6%2BYWTY2cqL75S76hNxDggDBZViOXbvjerGI%3D&h=3aa6faf1bce00cc2... HTTP 302
https://avaniejoshi.com/b/ HTTP 302
https://avaniejoshi.com/b/auth/?pwd=apple HTTP 302
https://avaniejoshi.com/b/auth/xN9dG1/login.php?id=48223518 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://payment-failed.intercom-mail.com/via/e?ob=X5NPiPLW6%2BYWTY2cqL75S76hNxDggDBZViOXbvjerGI%3D&h=3aa6faf1bce00cc21a924793bc972dec4142308f-l3hjwmfi_23482978421&l=900921db897dabd03cbd1c3c9b015a8c9ea7bbe8-84168800/
HTTP 307
https://payment-failed.intercom-mail.com/via/e?ob=X5NPiPLW6%2BYWTY2cqL75S76hNxDggDBZViOXbvjerGI%3D&h=3aa6faf1bce00cc21a924793bc972dec4142308f-l3hjwmfi_23482978421&l=900921db897dabd03cbd1c3c9b015a8c9ea7bbe8-84168800/ HTTP 302
https://avaniejoshi.com/b/ HTTP 302
https://avaniejoshi.com/b/auth/?pwd=apple HTTP 302
https://avaniejoshi.com/b/auth/xN9dG1/login.php?id=48223518 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
avaniejoshi.com/b/auth/xN9dG1/ Redirect Chain
|
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
helpers.css
avaniejoshi.com/b/auth/media/css/ |
41 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
avaniejoshi.com/b/auth/media/css/ |
12 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hamburger.png
avaniejoshi.com/b/auth/media/imgs/ |
267 B 354 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
apple.svg
avaniejoshi.com/b/auth/media/imgs/ |
863 B 954 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
shop.svg
avaniejoshi.com/b/auth/media/imgs/ |
477 B 555 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-down.png
avaniejoshi.com/b/auth/media/imgs/ |
468 B 547 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
apple-login.png
avaniejoshi.com/b/auth/media/imgs/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow.png
avaniejoshi.com/b/auth/media/imgs/ |
532 B 611 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-up.png
avaniejoshi.com/b/auth/media/imgs/ |
412 B 490 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.1.min.js
code.jquery.com/ |
88 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/ |
77 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.js
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.2.0/js/ |
1 MB 410 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.min.js
cdnjs.cloudflare.com/ajax/libs/jquery.mask/1.14.16/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js.js
avaniejoshi.com/b/auth/media/js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
9 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
search.svg
avaniejoshi.com/b/auth/media/imgs/ |
541 B 620 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v36/ |
47 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| uidEvent object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome object| $jscomp boolean| loaded1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
avaniejoshi.com/ | Name: PHPSESSID Value: o083jft71oek06c92ti81t1818 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
avaniejoshi.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
payment-failed.intercom-mail.com
103.8.127.157
2600:9000:214f:d400:19:1477:f380:93a1
2606:4700::6810:5814
2606:4700::6811:180e
2a00:1450:4001:80b::200a
2a00:1450:4001:82b::2003
2a04:4e42::649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