deliverypost-auz.vip
Open in
urlscan Pro
203.91.73.226
Malicious Activity!
Public Scan
Effective URL: https://deliverypost-auz.vip/
Submission: On May 26 via manual from HK — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 15th 2024. Valid for: a year.
This is the only time deliverypost-auz.vip was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australia Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 203.91.73.185 203.91.73.185 | 55020 (IDCCLOUD) (IDCCLOUD) | |
17 | 203.91.73.226 203.91.73.226 | 55020 (IDCCLOUD) (IDCCLOUD) | |
17 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
deliverypost-auz.vip
deliverypost-auz.vip |
617 KB |
1 |
infoparcel-auz.vip
1 redirects
infoparcel-auz.vip |
274 B |
17 | 2 |
Domain | Requested by | |
---|---|---|
17 | deliverypost-auz.vip |
deliverypost-auz.vip
|
1 | infoparcel-auz.vip | 1 redirects |
17 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
auspost.com.au |
catalogue.auspost.com.au |
Subject Issuer | Validity | Valid | |
---|---|---|---|
deliverypost-auz.vip Sectigo RSA Domain Validation Secure Server CA |
2024-05-15 - 2025-05-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://deliverypost-auz.vip/
Frame ID: 2383D8E473850A0753BAD76E0B9496F5
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
Shipping Information - Australia PostPage URL History Show full URLs
-
http://infoparcel-auz.vip/
HTTP 307
https://infoparcel-auz.vip/ HTTP 302
https://deliverypost-auz.vip/ Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*parbase
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: MyPost
Search URL Search Domain Scan URL
Title: Retail catalogue
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://infoparcel-auz.vip/
HTTP 307
https://infoparcel-auz.vip/ HTTP 302
https://deliverypost-auz.vip/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
deliverypost-auz.vip/ Redirect Chain
|
123 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProDisplay-Bold.woff2
deliverypost-auz.vip/content/fonts/ |
43 KB 43 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProDisplay-Light.woff2
deliverypost-auz.vip/content/fonts/ |
42 KB 42 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProDisplay-Medium.woff2
deliverypost-auz.vip/content/fonts/ |
43 KB 43 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProDisplay-Regular.woff2
deliverypost-auz.vip/content/fonts/ |
43 KB 43 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProText-Bold.woff2
deliverypost-auz.vip/content/fonts/ |
50 KB 50 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProText-Light.woff2
deliverypost-auz.vip/content/fonts/ |
48 KB 48 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProText-Medium.woff2
deliverypost-auz.vip/content/fonts/ |
49 KB 49 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
APTypeProText-Regular.woff2
deliverypost-auz.vip/content/fonts/ |
49 KB 49 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
clientlib.0a1338aaa51bb1c5a645e55aa5c035d1.css
deliverypost-auz.vip/content/css/ |
580 KB 128 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
deliverypost-auz.vip/Scripts/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
clientlib.1bf8cacb4cd6150286a971c2a33bd93e.js
deliverypost-auz.vip/content/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ap-acknowledgement-logos.svg
deliverypost-auz.vip/content/images/ |
41 KB 41 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Index.js
deliverypost-auz.vip/Content/js/ |
6 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
392 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
186 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-down.6ba30a1c2ead025d8b7d.svg
deliverypost-auz.vip/content/images/ |
413 B 514 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
395 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
deliverypost-auz.vip/content/favicons/ |
22 KB 22 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon-32x32.png
deliverypost-auz.vip/content/favicons/ |
611 B 698 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australia Post (Transportation)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
infoparcel-auz.vip/ | Name: PHPSESSID Value: g9klfcmsb4gn58tc4gqb96ql45 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
deliverypost-auz.vip
infoparcel-auz.vip
203.91.73.185
203.91.73.226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