qbsdigicloud.com
Open in
urlscan Pro
50.87.146.185
Malicious Activity!
Public Scan
Effective URL: https://qbsdigicloud.com/dhlil/rwoaopt102154s/
Submission: On January 16 via manual from IL — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 15th 2022. Valid for: 3 months.
This is the only time qbsdigicloud.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:10:... 2606:4700:10::ac43:8ee | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 50.87.146.185 50.87.146.185 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
qbsdigicloud.com
qbsdigicloud.com |
86 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2146 |
25 KB |
1 |
cutt.ly
1 redirects
cutt.ly — Cisco Umbrella Rank: 71676 |
491 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
4 | qbsdigicloud.com |
qbsdigicloud.com
|
1 | stackpath.bootstrapcdn.com |
qbsdigicloud.com
|
1 | cutt.ly | 1 redirects |
5 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
qbsdigicloud.com R3 |
2022-01-15 - 2022-04-15 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://qbsdigicloud.com/dhlil/rwoaopt102154s/
Frame ID: 80E0B149389EFBDA0B8806A8B42FCE4D
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
DHL_TrackingPage URL History Show full URLs
-
https://cutt.ly/yIz1GY2
HTTP 301
https://qbsdigicloud.com/dhlil/rwoaopt102154s/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cutt.ly/yIz1GY2
HTTP 301
https://qbsdigicloud.com/dhlil/rwoaopt102154s/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
qbsdigicloud.com/dhlil/rwoaopt102154s/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
qbsdigicloud.com/dhlil/rwoaopt102154s/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lg.svg
qbsdigicloud.com/dhlil/rwoaopt102154s/img/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pub.jpg
qbsdigicloud.com/dhlil/rwoaopt102154s/img/ |
80 KB 81 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onsecuritypolicyviolation object| onslotchange1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cutt.ly/ | Name: PHPSESSID Value: s8l6a0s625e0o9otd7jvepild4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cutt.ly
qbsdigicloud.com
stackpath.bootstrapcdn.com
2606:4700:10::ac43:8ee
2606:4700::6812:acf
50.87.146.185
5b0fbe5b7ad705f6a937c4998ad02f73d8f0d976fe231b74aef0ec996990c93a
75e096f8e5725fd291012f93ddb28248d32a2f86961e6104920d53beb00a665f
aeed178a287002e32c4a7767dc24b3c732a812cdd42017835055e42db4d2eae1
cd6a918a7bbbd38a021abf0759a10618e98e51efc1480be9ff3c1f680d1b2f9d
fd6d79b881550d2aced201e506cbd7dfacafc19c16db81a655ad06f2835819c5