booking.deal1941.bid
Open in
urlscan Pro
2606:4700:3035::ac43:9bcb
Malicious Activity!
Public Scan
Submission: On December 01 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by E1 on November 27th 2023. Valid for: 3 months.
This is the only time booking.deal1941.bid was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Booking (Travel)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 2606:4700:303... 2606:4700:3035::ac43:9bcb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2600:9000:212... 2600:9000:2127:e000:5:bf05:acc0:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
8 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
deal1941.bid
booking.deal1941.bid |
57 KB |
1 |
bstatic.com
cf.bstatic.com — Cisco Umbrella Rank: 16074 |
30 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
6 | booking.deal1941.bid |
booking.deal1941.bid
|
1 | cf.bstatic.com |
booking.deal1941.bid
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
deal1941.bid E1 |
2023-11-27 - 2024-02-25 |
3 months | crt.sh |
*.bstatic.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-09-13 - 2024-08-31 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://booking.deal1941.bid/secure-checkout/34514263
Frame ID: 4DE91F366962CD16EC24FB0799469E99
Requests: 7 HTTP requests in this frame
Frame:
https://booking.deal1941.bid/supportChatFrame/34514263
Frame ID: ECC8A66AA0C2A12B98F73AF604BE2363
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
34514263
booking.deal1941.bid/secure-checkout/ |
57 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
booking.deal1941.bid/services/booking/js/ |
12 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
booking.deal1941.bid/services/booking/css/ |
32 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
417683578.jpg
cf.bstatic.com/xdata/images/hotel/max500/ |
30 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
support_parent.css
booking.deal1941.bid/css/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flags.png
booking.deal1941.bid/services/booking/images/ |
30 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
34514263
booking.deal1941.bid/supportChatFrame/ Frame ECC8 |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pluxurydarklord.svg
booking.deal1941.bid/img/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- booking.deal1941.bid
- URL
- https://booking.deal1941.bid/supportChatFrame/34514263
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Booking (Travel)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
booking.deal1941.bid/ | Name: connect.sid Value: s%3A56rkpY9-6uqJFd-b0mI8La6fkDGD0oGK.chGogLhEhxDKojo0sPDVWMVtu2g9j8NSwB0fl5Hcfrs |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
booking.deal1941.bid
cf.bstatic.com
booking.deal1941.bid
2600:9000:2127:e000:5:bf05:acc0:93a1
2606:4700:3035::ac43:9bcb
20f5cc0ebb84eb9bdeb82a9b908e9f922ab10ea415857c8b00b8302e00c61a5c
403717e6f897ea1863084ece8ade956cee701070615931ac40e43d171ab873f7
7af96b589c08faa9b3014d28497abd0b8e428307b8ec4b93f58977e9fd62905b
7f6bbb1ac24b9f79dcf2c1b0ee651cb117eaffe5726f07400258949408e9a997
b2e3158656f24d0f69988896ea2facd530904745d286f84eadb67ceb2ce9d4c2
fbb307bc48c763f9a4893ba918ca9a322f4e084dbb994504d526af90c1a4d1e9
fc78e1550450ab81964ef660b05cb14fb17e0b895b261925ad7e6e073502dfc4