zetaware.net
Open in
urlscan Pro
143.95.39.205
Malicious Activity!
Public Scan
Submission: On October 16 via api from CA — Scanned from CA
Summary
TLS certificate: Issued by R3 on September 20th 2022. Valid for: 3 months.
This is the only time zetaware.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation) Alibaba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 143.95.39.205 143.95.39.205 | 62729 (ASMALLORA...) (ASMALLORANGE1) | |
10 | 1 |
ASN62729 (ASMALLORANGE1, US)
PTR: starbuck.asoshared.com
zetaware.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
zetaware.net
zetaware.net |
572 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | zetaware.net |
zetaware.net
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
zetaware.net R3 |
2022-09-20 - 2022-12-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://zetaware.net/teambiases/DHL/DHL.htm
Frame ID: 1F572E2FD4072D96CCF177C5DD493430
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
DHL.htm
zetaware.net/teambiases/DHL/ |
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpg
zetaware.net/teambiases/DHL/DHL_files/ |
55 KB 55 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img10.jpg
zetaware.net/teambiases/DHL/DHL_files/ |
35 KB 35 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
163.jpg
zetaware.net/teambiases/DHL/DHL_files/ |
13 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
globalsources.gif
zetaware.net/teambiases/DHL/DHL_files/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hotmail.jpg
zetaware.net/teambiases/DHL/DHL_files/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yahoo.png
zetaware.net/teambiases/DHL/DHL_files/ |
120 KB 121 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yeah.gif
zetaware.net/teambiases/DHL/DHL_files/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
126.gif
zetaware.net/teambiases/DHL/DHL_files/ |
6 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alibaba.png
zetaware.net/teambiases/DHL/DHL_files/ |
327 KB 330 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation) Alibaba (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
zetaware.net
143.95.39.205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