av.sc.com
Open in
urlscan Pro
2a02:26f0:1700:38d::6dc
Public Scan
Effective URL: https://av.sc.com/in/edm/gfa-investment-fraud-oct22/?__sta=TYQFBYYVVJQUBBIF%7CBVQHV&__stm_medium=email&__stm_sourc...
Submission: On July 10 via api from IN — Scanned from DE
Summary
TLS certificate: Issued by DigiCert SHA2 Extended Validation Ser... on May 31st 2023. Valid for: a year.
This is the only time av.sc.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 65.1.223.29 65.1.223.29 | 16509 (AMAZON-02) (AMAZON-02) | |
23 | 2a02:26f0:170... 2a02:26f0:1700:38d::6dc | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 2a02:26f0:170... 2a02:26f0:1700:391::11a6 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a02:26f0:710... 2a02:26f0:7100:594::11a6 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
26 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-65-1-223-29.ap-south-1.compute.amazonaws.com
scbrb.zeemail.in |
ASN20940 (AKAMAI-ASN1, NL)
s.go-mpulse.net | |
684dd32f.akstat.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
sc.com
av.sc.com — Cisco Umbrella Rank: 124439 |
46 KB |
2 |
go-mpulse.net
s.go-mpulse.net — Cisco Umbrella Rank: 1293 c.go-mpulse.net — Cisco Umbrella Rank: 579 |
50 KB |
1 |
akstat.io
684dd32f.akstat.io — Cisco Umbrella Rank: 62302 |
197 B |
1 |
zeemail.in
1 redirects
scbrb.zeemail.in |
280 B |
26 | 4 |
Domain | Requested by | |
---|---|---|
23 | av.sc.com |
av.sc.com
|
1 | 684dd32f.akstat.io |
s.go-mpulse.net
|
1 | c.go-mpulse.net |
s.go-mpulse.net
|
1 | s.go-mpulse.net |
av.sc.com
|
1 | scbrb.zeemail.in | 1 redirects |
26 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.sc.com |
apps.apple.com |
play.google.com |
www.facebook.com |
www.instagram.com |
twitter.com |
www.youtube.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.sc.com DigiCert SHA2 Extended Validation Server CA |
2023-05-31 - 2024-05-30 |
a year | crt.sh |
akstat.io DigiCert TLS RSA SHA256 2020 CA1 |
2023-04-05 - 2024-04-04 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://av.sc.com/in/edm/gfa-investment-fraud-oct22/?__sta=TYQFBYYVVJQUBBIF%7CBVQHV&__stm_medium=email&__stm_source=smartech
Frame ID: 73CD7A0DC898735FF8D9E2B4B4894B11
Requests: 24 HTTP requests in this frame
Frame:
https://s.go-mpulse.net/boomerang/LK67E-USBC2-P626M-54VGS-B7RYL
Frame ID: 45A373013C9FB70E0C1E00E541EFFC0E
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Standard Chartered eDMPage URL History Show full URLs
-
http://scbrb.zeemail.in/vtrack?clientid=113190&ul=UwNRDgdSBFtIAk9HXRFRAwpNBwNYVgJfWHBbUVEGCloDWgkXB1...
HTTP 302
https://av.sc.com/in/edm/gfa-investment-fraud-oct22/?__sta=TYQFBYYVVJQUBBIF%7CBVQHV&__stm_medi... Page URL
Detected technologies
Akamai Bot Manager (Security) ExpandDetected patterns
Page Statistics
8 Outgoing links
These are links going to different origins than the main page.
Title: sc.com/fightingfraud/myaccount
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: click here
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://scbrb.zeemail.in/vtrack?clientid=113190&ul=UwNRDgdSBFtIAk9HXRFRAwpNBwNYVgJfWHBbUVEGCloDWgkXB14PRAIIDVwHDwcCBwUBXFYMAgEY&ml=UwZdBAofAh4HBAcBBB4=&sl=I04mSnotTjF5Zk9CVwBLAEgZAAdZWA9aF1lcTgg=&pp=0&fl=CUYRRkBZHU1VRB1CV0xaDQtMDAwbXAJbFldUUxUMDU4HRxZUAV8WFVRLVRBQGl1TQQEFSg==&ext=
HTTP 302
https://av.sc.com/in/edm/gfa-investment-fraud-oct22/?__sta=TYQFBYYVVJQUBBIF%7CBVQHV&__stm_medium=email&__stm_source=smartech Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
26 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
av.sc.com/in/edm/gfa-investment-fraud-oct22/ Redirect Chain
|
133 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
masthead.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
9 KB 10 KB |
Image
image/avif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
headline.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
2 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon1.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
735 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spacer.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
72 B 548 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon12.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
843 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon11.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
791 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon3.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
1 KB 1 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon4.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
743 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon5.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
653 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon6.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
455 B 902 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon7.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
527 B 975 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon8.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
532 B 979 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon9.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
507 B 984 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon10.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
515 B 962 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Appstore.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
2 KB 3 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Googleplay.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
2 KB 2 KB |
Image
image/avif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
260 B 708 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
insta.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
284 B 763 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tw.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
282 B 729 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yt.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
236 B 715 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer-logo.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
629 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer-logo-2.png
av.sc.com/in/edm/gfa-investment-fraud-oct22/images/ |
878 B 1 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LK67E-USBC2-P626M-54VGS-B7RYL
s.go-mpulse.net/boomerang/ Frame 45A3 |
205 KB 49 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
config.json
c.go-mpulse.net/api/ Frame 45A3 |
909 B 859 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
684dd32f.akstat.io/ |
0 197 B |
Ping
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend object| BOOMR_mq string| BOOMR_API_key object| BOOMR number| BOOMR_lstart number| BOOMR_onload number| BOOMR_configt3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.sc.com/ | Name: AKA_A2 Value: A |
|
.sc.com/ | Name: ak_bmsc Value: 18816EEFBC59BD14382D461DB0E5B1C9~000000000000000000000000000000~YAAQEWZWuG/JFCCJAQAAIIe2PhQ4sBQgyCW3PDnAdpvBCx9YzRYd++GLsmsRMpF/tsLgjTuZa2NPLVd/M/dzxj+ZX0AS9JqolMTwEf4pg3raq71oJG8y8B+8e6O+sJqikBL0wo5fxY6dPj6QFsrlDdt/V1ROb7FrOFU39e8VPKQ3hGCiDtK/xochrSGF9wlLQYlvgKdsiMnU+BorKhzGWj1Swc+xN2XOSC3tbtt0PYIcIxp0bEjrn6cb6mtzjEIwVROODHRYcjn5Ai/veon5Iijj87a+3ZmKTuByxx1cH7wohHQdTgbHklvRdn9C5pDP69C4CFA34RnERZJCirXch0l8ovgSl6ZvfHvVybJ+zmwOMwPEdbHrTIqsDeC8+Cgtn6a22NH+BYrBKuKni4WzFLk= |
|
.av.sc.com/ | Name: RT Value: "z=1&dm=av.sc.com&si=a8def1f2-71d8-4ed1-985e-da951c29a7de&ss=ljwjoqfz&sl=1&tt=1r3&bcn=%2F%2F684dd32f.akstat.io%2F&ld=20g" |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
684dd32f.akstat.io
av.sc.com
c.go-mpulse.net
s.go-mpulse.net
scbrb.zeemail.in
2a02:26f0:1700:38d::6dc
2a02:26f0:1700:391::11a6
2a02:26f0:7100:594::11a6
65.1.223.29
051a173b2a4ff6cdd39f4ae47867ef86613f4a12ca79a57e1ede7518e31f5bbf
0949da709571f8d1a45de7f822b96ac7adb6e9c0c4176321951d80ee2b1bd3cc
09ebd7f407439990aac227e70da23e1a819e8e30282928e324370805f480bec4
0be74bb6941947d93f1cd8b54dec0f445c68b8a6ad41fbfdef83c68a86b6209d
0e1b2c9ad718032ee42e85e1b833603c15be07d470acb15c024698d517c3a0e2
1594eacc5948cd7b66573f46cbcb6b356ee4c9b64c7a1acae0301e621129ec00
19cc3b10d505528763c37eb9a7d5d213967f826a23d23c07b0132ef2fb1cf401
40702efe59661d6e4fafec5f81671d1e6d2a727e89d59c2d5e972eea7583904e
41e8020919b3dbf5c9caeb1140ef7aae1306fd7e0d0223ae00566e699536bc27
432e8b064a4956ede0c8145f854ace3cd99ab5fdba879642169ca1972fe8b744
5423659ceba9d5510a7c50bda32c532b0e3436b69148524cd68f507ea9bec016
6dba302b003f0d59f326bdbb80ec9187b46a6004415757e7752d3fd299678ab6
70e338895f480da96603c23a935338a64887df089696365063016c36bc35d979
72d6aa38b1904a18f8a7ea78a2364001b54aa9a8fee62d84429d2ba8998d6391
8582bf22ef2849026334d8086b63660a636b0d29f61554ba3dfcbf7633dac76f
9626b81e2c7327cf2722895d48be0471ad25b543c43c5ebd365414e3a28ba3cc
b5d826b5ade88a78bcb9e346301f2066a05e6a5c00b5eca1387942a70a9803d4
c1c7736eab1bf8be232af4fb53d76467a8c9024f3e80ad2da58a7132878dc7f6
c36e01768c9571f97aff67fdf188561576700b0993f806c0e30ee485c13326ed
cf178c18c60616fbadbe5254dccd9732e6e4d63d875d0e55c48aac6fa603b096
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e4a929fbd59b6226ddd60968c15eec1130a85971ba33e1e5638f10a917b9aa91
f08f9d21f936e7f2d9048e40c20ee4169e049184d6dc29734f972bc50a12e8c7
f4aaa54e560233dcbfbef2439d989adbe209a8802d1b68563403e645b5bb27fd
f6d257c37f80cf9e8dd410ddaa99c2b554b712a50c6a9397034361821872e279
fa277b23adcf3c4213cbd44b4af35e07031c5ec4b1975f001371645ca1bbfbac