aegisit.net
Open in
urlscan Pro
50.28.35.167
Malicious Activity!
Public Scan
Effective URL: https://aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1...
Submission: On August 04 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 20th 2020. Valid for: 3 months.
This is the only time aegisit.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 50.28.35.167 50.28.35.167 | 32244 (LIQUIDWEB) (LIQUIDWEB) | |
1 | 2606:4700::68... 2606:4700::6810:85e5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:81e::200a | 15169 (GOOGLE) (GOOGLE) | |
13 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
aegisit.net
aegisit.net |
124 KB |
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
47 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
8 | aegisit.net |
aegisit.net
|
3 | maxcdn.bootstrapcdn.com |
aegisit.net
|
1 | ajax.googleapis.com |
aegisit.net
|
1 | cdnjs.cloudflare.com |
aegisit.net
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
aegisit.net Let's Encrypt Authority X3 |
2020-06-20 - 2020-09-18 |
3 months | crt.sh |
cloudflare.com Cloudflare Inc ECC CA-3 |
2020-07-04 - 2021-07-04 |
a year | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-07-07 - 2020-09-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 282C041E7F7B2D296F072811CB6D3BA4
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/index.php Page URL
- https://aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/db.php?rand=13InboxLightaspxn.1774256418&fi... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/index.php Page URL
- https://aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/ |
249 B 549 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
db.php
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/ |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.0/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhl_logo.gif
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/images/ |
443 B 785 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
delivery.png
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/images/ |
66 KB 66 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
to_view.jpg
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/images/ |
20 KB 21 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
support.jpg
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/images/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
.jpg
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/images/ |
355 B 355 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dot.png
aegisit.net/dhl/DHL%20REVENGE%20BY%20ALIBOBO/images/ |
203 B 545 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyphicons-halflings-regular.woff2
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/fonts/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| drops0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aegisit.net
ajax.googleapis.com
cdnjs.cloudflare.com
maxcdn.bootstrapcdn.com
2001:4de0:ac19::1:b:3b
2606:4700::6810:85e5
2a00:1450:4001:81e::200a
50.28.35.167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