lediaz.com
Open in
urlscan Pro
104.254.247.223
Malicious Activity!
Public Scan
Submission: On November 06 via automatic, source openphish
Summary
This is the only time lediaz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 104.254.247.223 104.254.247.223 | 8560 (ONEANDONE...) (ONEANDONE-AS Brauerstrasse 48) | |
14 | 1 |
ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE)
PTR: servidor.valcam.mx
lediaz.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
lediaz.com
lediaz.com |
2 MB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | lediaz.com |
lediaz.com
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://lediaz.com/dhlf/login.php
Frame ID: 2519CCBC884C1EE941E80B903682A534
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
lediaz.com/dhlf/ |
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g1.png
lediaz.com/dhlf/images/ |
404 KB 404 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g2.png
lediaz.com/dhlf/images/ |
315 KB 315 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g3.png
lediaz.com/dhlf/images/ |
189 KB 190 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g4.png
lediaz.com/dhlf/images/ |
35 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g5.png
lediaz.com/dhlf/images/ |
90 KB 90 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g6.png
lediaz.com/dhlf/images/ |
509 KB 509 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g7.png
lediaz.com/dhlf/images/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g8.png
lediaz.com/dhlf/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g9.png
lediaz.com/dhlf/images/ |
967 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g10.png
lediaz.com/dhlf/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g11.png
lediaz.com/dhlf/images/ |
716 B 999 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
g12.png
lediaz.com/dhlf/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lng.png
lediaz.com/dhlf/images/ |
466 B 749 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
lediaz.com
104.254.247.223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