trainagoda.com
Open in
urlscan Pro
43.133.141.14
Malicious Activity!
Public Scan
Effective URL: https://trainagoda.com/
Submission Tags: phishing scam Search All
Submission: On September 04 via api from ZA — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 31st 2023. Valid for: 3 months.
This is the only time trainagoda.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Agoda (Travel)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 15 | 43.133.141.14 43.133.141.14 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
14 | 2 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
trainagoda.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
trainagoda.com
1 redirects
trainagoda.com |
1 MB |
14 | 1 |
Domain | Requested by | |
---|---|---|
15 | trainagoda.com |
1 redirects
trainagoda.com
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
trainagoda.com R3 |
2023-08-31 - 2023-11-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://trainagoda.com/
Frame ID: 90AD474B164291C7FFE8DDB04F4F97F9
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
LoginPage URL History Show full URLs
-
http://trainagoda.com/
HTTP 301
https://trainagoda.com/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://trainagoda.com/
HTTP 301
https://trainagoda.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
trainagoda.com/ Redirect Chain
|
767 B 1020 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.97465e7b.css
trainagoda.com/static/ |
94 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.6dbb1c00.js
trainagoda.com/static/js/ |
837 KB 309 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.72265177.js
trainagoda.com/static/js/ |
4 MB 688 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pages-login-login.95755f5c.js
trainagoda.com/static/js/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
48.png
trainagoda.com/static/icon/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
trainagoda.com/static//logo/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
49.png
trainagoda.com/static/icon/ |
971 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
trainagoda.com/static/icon/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
trainagoda.com/static/icon/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
49.png
trainagoda.com/static/icon/ |
971 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
trainagoda.com/static//logo/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
trainagoda.com/static/icon/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
trainagoda.com/static/icon/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Agoda (Travel)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture boolean| coverSupport object| webpackJsonp object| __uniConfig object| __uniRoutes function| UniApp object| UniViewJSBridge object| UniServiceJSBridge object| uni object| wx function| getApp function| getCurrentPages object| regeneratorRuntime0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
trainagoda.com
43.133.141.14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