pelosishop.com
Open in
urlscan Pro
2606:4700:3030::6815:5297
Malicious Activity!
Public Scan
Submission: On November 10 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 6th 2022. Valid for: a year.
This is the only time pelosishop.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Maersk (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 2606:4700:303... 2606:4700:3030::6815:5297 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
pelosishop.com
pelosishop.com |
1 MB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | pelosishop.com |
pelosishop.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-06 - 2023-06-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://pelosishop.com/parcel/new/view/1/?email=3mail@b.c
Frame ID: 77C6ACA736E56895F2AA3D8FE972BD4F
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
pelosishop.com/parcel/new/view/1/ |
62 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
maersk.svg
pelosishop.com/parcel/new/view/1/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SecurePDFsmall.png
pelosishop.com/parcel/new/view/1/images/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b1.jpg
pelosishop.com/parcel/new/view/1/images/ |
90 KB 90 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b2.jpg
pelosishop.com/parcel/new/view/1/images/ |
115 KB 115 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b3.jpg
pelosishop.com/parcel/new/view/1/images/ |
257 KB 257 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b4.jpg
pelosishop.com/parcel/new/view/1/images/ |
72 KB 73 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b5.jpg
pelosishop.com/parcel/new/view/1/images/ |
139 KB 140 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b6.jpg
pelosishop.com/parcel/new/view/1/images/ |
594 KB 594 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pattern.png
pelosishop.com/parcel/new/view/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Maersk (Transportation)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pelosishop.com
2606:4700:3030::6815:5297
05112f50ed02422cec8883a32326e8975cea42861c22e5fe2e0fcb0f0211e54f
211212a726d841505acbe33a45c5de37da0c90b26dcde67d72d3e4810a567f70
31db972937750fdc2de5d288894d50882876c031f05ee5eafb1a41c5775f35a5
7ad842ecf9aab88ba486f9df87af6ed09b00104034d518edce301a78c8c1aa21
87737af4240596be6ca1e2a0b98c2b05325822dd9405c07aa6a04378fe967355
8a46f0f573f565185557acf1eba4702ae240985c66ff1677157b585a294fb4e2
8fda4e79f6b98ab1890a54902431fb1fbcdaa5599262b17f0a12534f24e4187b
915ee5d5e27e36936d1f761ad6312b6919dd0018a7244f3ac613c5e705f9f0cd
c9afca0cd6a234e984e49f7e63871a20de461b9c320f30e140cfbe8c7dea1b7a
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3