inp0st-pay-site.650000000002.xyz
Open in
urlscan Pro
2606:4700:3031::ac43:8d72
Malicious Activity!
Public Scan
Effective URL: https://inp0st-pay-site.650000000002.xyz/mbume8jc?from_email=1
Submission: On November 05 via manual from PL — Scanned from NL
Summary
TLS certificate: Issued by E1 on November 4th 2022. Valid for: 3 months.
This is the only time inp0st-pay-site.650000000002.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: InPost (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 2606:4700:303... 2606:4700:3031::ac43:8d72 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 3 |
ASN13335 (CLOUDFLARENET, US)
inp0st-pay-site.650000000002.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
650000000002.xyz
inp0st-pay-site.650000000002.xyz |
422 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 361 |
9 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 959 |
33 KB |
1 |
brjfhd.com
1 redirects
brjfhd.com |
1 KB |
16 | 4 |
Domain | Requested by | |
---|---|---|
14 | inp0st-pay-site.650000000002.xyz |
inp0st-pay-site.650000000002.xyz
cdnjs.cloudflare.com |
1 | cdnjs.cloudflare.com |
inp0st-pay-site.650000000002.xyz
|
1 | code.jquery.com |
inp0st-pay-site.650000000002.xyz
|
1 | brjfhd.com | 1 redirects |
16 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
inpost.pl |
grupainteger.logintrade.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.650000000002.xyz E1 |
2022-11-04 - 2023-02-02 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://inp0st-pay-site.650000000002.xyz/mbume8jc?from_email=1
Frame ID: A9AF65520AE88E3E590250C38E9E0337
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Śledzenie przesyłek InPost | InPost - Paczkomaty, Kurier, Przesyłki KurierskiePage URL History Show full URLs
-
https://brjfhd.com/s/9nRByj
HTTP 302
https://inp0st-pay-site.650000000002.xyz/mbume8jc?from_email=1 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Title: Odbieram
Search URL Search Domain Scan URL
Title: Wysyłam
Search URL Search Domain Scan URL
Title: Oferta dla Firm
Search URL Search Domain Scan URL
Title: O InPost
Search URL Search Domain Scan URL
Title: Kariera
Search URL Search Domain Scan URL
Title: Cennik
Search URL Search Domain Scan URL
Title: Kontakt
Search URL Search Domain Scan URL
Title: Śledź paczkę
Search URL Search Domain Scan URL
Title: Znajdź Paczkomat
Search URL Search Domain Scan URL
Title: Fundacja InPost
Search URL Search Domain Scan URL
Title: Szybkie Nadania
Search URL Search Domain Scan URL
Title: Dla dostawców
Search URL Search Domain Scan URL
Title: Reklama z InPost
Search URL Search Domain Scan URL
Title: Regulaminy
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://brjfhd.com/s/9nRByj
HTTP 302
https://inp0st-pay-site.650000000002.xyz/mbume8jc?from_email=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
mbume8jc
inp0st-pay-site.650000000002.xyz/ Redirect Chain
|
25 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
inp0st-pay-site.650000000002.xyz/css/ |
67 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
search.png
inp0st-pay-site.650000000002.xyz/delivery-services/inpost/ |
1019 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Sledzenie1.png
inp0st-pay-site.650000000002.xyz/delivery-services/inpost/ |
158 KB 159 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Sledzenie2.png
inp0st-pay-site.650000000002.xyz/delivery-services/inpost/ |
66 KB 67 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.12.4.min.js
code.jquery.com/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
howler.min.js
cdnjs.cloudflare.com/ajax/libs/howler/2.1.1/ |
34 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
inp0st-pay-site.650000000002.xyz/js/ |
358 KB 107 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.png
inp0st-pay-site.650000000002.xyz/delivery-services/inpost/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
inp0st-pay-site.650000000002.xyz/socket.io/ |
104 B 615 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
new-message.mp3
inp0st-pay-site.650000000002.xyz/sounds/ |
40 KB 41 KB |
XHR
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
messages
inp0st-pay-site.650000000002.xyz/chats/client/ |
63 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
avatar.png
inp0st-pay-site.650000000002.xyz/chat/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
attach-file.png
inp0st-pay-site.650000000002.xyz/chat/ |
919 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
/
inp0st-pay-site.650000000002.xyz/socket.io/ |
2 B 541 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
inp0st-pay-site.650000000002.xyz/socket.io/ |
3 B 524 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: InPost (Transportation)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| HowlerGlobal object| Howler function| Howl function| Sound object| webpackChunk function| Pusher function| pusher function| io object| echo function| axios function| showSupportChat7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.brjfhd.com/ | Name: __ddg1_ Value: HJHlTGvCOt0BxwhwrmJi |
|
brjfhd.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Ikp3MTYzajlCRFJRREgzMkpsUmU3M3c9PSIsInZhbHVlIjoiS2ZITVh4dmJJSXo4a0swQmlTZ3VPNFB4V0RPZ0tMUS9uNlIwb3hPMmFKQXFpY2ZTWHBPMlhJRFdPNVBqamZZN1RoYkdRNUVIVEV1bTQ0UUFRVzE3L3FxcVVIVmdtOVUvWlV2ak1DRis3UGlUb2NzbFFZSDdJdWdiUEU4NUwvUXUiLCJtYWMiOiJhM2VhOGRhMzI0YmM4NzIzZjhkNjExYTYwNjZhYTkzMWU1OWViN2YzMmNkOWIzZTkyNmM4ZTNjN2JjYTIzNDgzIiwidGFnIjoiIn0%3D |
|
brjfhd.com/ | Name: public_session Value: eyJpdiI6IjVDQ01ERytxOFh6bC9HalhlRWpvU2c9PSIsInZhbHVlIjoiZENxcVRDT2lXejM0VGpVS28wK1k3bGt4VzVTYnVpdk1nc0VGMDBOQ2tmMHlNOWs4MWFCSzdMNnluckliQnNUcnp1djJYVFpUNWpoQnpsWmc2OGIrQ1lXUXBiWTlpZ0dWbG55MUVReFAwQXdhZjl1YlkrQS9vdk5IVUh4bUFqeVMiLCJtYWMiOiJmMGYzMDJiYzdmMjZjNTdhYjRjYmI2MDg5ZmY5ZWM0NDFhZGViNjQ2NTA5MTA1MzJmYzNlNDkzYmM2YjgyYjU4IiwidGFnIjoiIn0%3D |
|
.650000000002.xyz/ | Name: __ddg1_ Value: IHRBehwzNaoyne3BXDZT |
|
inp0st-pay-site.650000000002.xyz/ | Name: io Value: x-W26MYlsxOveHlhBE73 |
|
inp0st-pay-site.650000000002.xyz/ | Name: XSRF-TOKEN Value: eyJpdiI6InB0Z1ptUGc0V3h0NVJ0RkIrVzJaZHc9PSIsInZhbHVlIjoiSWU3WjRqb2tyY0pkU3hmOHZNeFFyb215dFY5WmxYMGQ3YytEc1MyaTRpSHpxb21kbnlsNTMzVGs0MitQNmI0VnFlYXlXaEQ3VEQxMlBFdUh0QmxSeWdMditUS3RUeVh1WlhidEJ2Vnprckt1V1haTUZuYW4zS2NqSU52NjVjUWUiLCJtYWMiOiI2M2VmM2M0ZTU1NzE2MzkxMTM0NjYwNTM1Y2FkNDdiZGUyMDEyMzUxOGFmM2NlZmMwNWM1NjUwZjg3OTFkOGU2IiwidGFnIjoiIn0%3D |
|
inp0st-pay-site.650000000002.xyz/ | Name: public_session Value: eyJpdiI6IlFJNVljVXBLeU9kNERzTWp2eitGdFE9PSIsInZhbHVlIjoiQ05tZjhoeG9CcEtRZkFCcmdhK2svK2ltd0NybENZQjZ0WE4rMFg5S3puL0dmRjV6V2VELzg3R05tZHozTExaUDg1ZlVBMlVaeCtDS2hxUkxmNjFJUElwbHlpckRRRm4zZ2YyTzFUN0pIbHRXbGN6QUNRNGI1OGZLejZEb3N4a20iLCJtYWMiOiI1YjZjNjk5NTQxMTAyNmIyNjUzMGZkNGZhZWQyNzA4OWM2YzMxMWM4MGIwNTQwNGYxOWU2NzJjY2I2NjM5NzVjIiwidGFnIjoiIn0%3D |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
brjfhd.com
cdnjs.cloudflare.com
code.jquery.com
inp0st-pay-site.650000000002.xyz
2001:4de0:ac18::1:a:3a
2606:4700:3031::ac43:8d72
2606:4700::6811:180e
2a06:98c1:3121::3
0a94e49a7ba51902cee0c16ba5abd5955310b8dfaba45863f7c59c22ec26f2a1
0b1aeeffe1f6bf8a899dad1d463cefd3016ff3b734dfc6c1eb0df78bfe3527d8
174ed693bb0f9db670036cc2cfb2e4029a71e5f749a40ae37cfa0d1f76a1020a
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
396a069f600acb7f6788b28df8d1f4c2c421f173d12870b3bd093d2954d9bde1
48ceb08a4f87560a187e8f53d01abbe17ba43f74dd0ccb246c351208db892f67
62325dfc1fc675255519674da6e2c4aad5f51cc6c3217ed3c6fbf6cabe0d86b0
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
9aa374919321ab6ef579b0db9dc090d42fc2c114702bc2bc5ebb2cdd005a0adf
a3040ac9c03157b1ed03192452efcf576661a913685ed116ad15630c0e532fd5
ab8179aceba15189f15e43cfa01b58b4eeac1024bc64beb26303ae3f40786047
aeb2f825db229cdd5916e1b4838ae1e3278c2508e103c9869eeb146110dd4f24
ba6627d326721385e6a64d7b56cb98061f32f9667d3a6f1524d2e5ca73c2de97
bc1eada786de9481f7c956d4e874309469889b789b50723ca6baa6dd01defe16
cb9074c94fff4bb2bc93b68333a2066f60e16d2aa0f1f36ca134985db3f64e5d
ef09af6f51079f7a264e1ae0be2ed290c8f7d839ef7547cfade2ca0f07743690