jawaidaslambrothers.pk
Open in
urlscan Pro
216.172.190.182
Malicious Activity!
Public Scan
Effective URL: http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/
Submission: On November 06 via manual from US
Summary
This is the only time jawaidaslambrothers.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 216.172.190.182 216.172.190.182 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
6 | 1 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: voz.vozye.com
jawaidaslambrothers.pk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
jawaidaslambrothers.pk
2 redirects
jawaidaslambrothers.pk |
244 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
8 | jawaidaslambrothers.pk |
2 redirects
jawaidaslambrothers.pk
|
6 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/
Frame ID: 20069.1
Requests: 5 HTTP requests in this frame
Frame:
http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/index_files/Prefetch.html
Frame ID: 20069.2
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://jawaidaslambrothers.pk/servlet/
HTTP 302
http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3 HTTP 301
http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://jawaidaslambrothers.pk/servlet/
HTTP 302
http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3 HTTP 301
http://jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/ Redirect Chain
|
18 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.min.css
jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/index_files/ |
21 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
heroillustration
jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/index_files/ |
199 KB 199 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bannerlogo
jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/index_files/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.png
jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/index_files/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Prefetch.html
jawaidaslambrothers.pk/servlet/1060e677112e9ef02eee3a782b0dd7a3/index_files/ Frame 2006 |
383 B 383 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jawaidaslambrothers.pk
216.172.190.182
4517f25439e2b03575166521be52889f0d1e055cc3982f0ae24fab4abd444283
655aaf60de22be3b78c0dfcf5b9e385b8000dc5625f32f8695ac4f1c87d02fce
7e50e406688bd898803f653058d14ca384734cb9b39ba900bc5e2734b59c073b
988e349f2bf4e87154738c7b2c1fa86618713a8cfa0cef60a046f5add89bd9de
d2544561f10cd50c54d098e0ad6daee0d0833bbebde532121553205353d873c5
fc5c3d7d2b298a42ec44dad2d8cd227b734db966b4afa68c0254a497e805f603