khatronkekhiladi.org
Open in
urlscan Pro
2606:4700:30::681c:6a2
Malicious Activity!
Public Scan
Effective URL: https://khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/
Submission: On March 15 via manual from IN
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 27th 2019. Valid for: a year.
This is the only time khatronkekhiladi.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 18 | 2606:4700:30:... 2606:4700:30::681c:6a2 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
khatronkekhiladi.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
khatronkekhiladi.org
3 redirects
khatronkekhiladi.org |
222 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
18 | khatronkekhiladi.org |
3 redirects
khatronkekhiladi.org
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-01-27 - 2020-01-27 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/
Frame ID: B523DDF8BAEF1A62B33473CC56A72F33
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://khatronkekhiladi.org/zxc/File0&uoload
HTTP 301
https://khatronkekhiladi.org/zxc/File0&uoload/ HTTP 302
https://khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e HTTP 301
https://khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://khatronkekhiladi.org/zxc/File0&uoload
HTTP 301
https://khatronkekhiladi.org/zxc/File0&uoload/ HTTP 302
https://khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e HTTP 301
https://khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/ Redirect Chain
|
9 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av011.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bt01.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
491 B 549 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av021.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av022.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bt02.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av031.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bt03.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av041.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bt04.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av051.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bt05.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
923 B 985 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
av061.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bt06.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
491 B 553 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
001.png
khatronkekhiladi.org/zxc/File0&uoload/fc40b2e48807854d9759ce1c460d774e/img/ |
188 KB 189 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.khatronkekhiladi.org/ | Name: __cfduid Value: d320ddbcd06fff16c3f5cb6b1f84e35391552674011 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
khatronkekhiladi.org
2606:4700:30::681c:6a2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