www.customers.report.jliedu.com
Open in
urlscan Pro
67.225.137.48
Malicious Activity!
Public Scan
Submission: On December 22 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by customers.report.jliedu.com on December 22nd 2021. Valid for: a year.
This is the only time www.customers.report.jliedu.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: eBay (E-commerce)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 67.225.137.48 67.225.137.48 | 32244 (LIQUIDWEB) (LIQUIDWEB) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2 |
ASN32244 (LIQUIDWEB, US)
PTR: host1.jli.edu.in
www.customers.report.jliedu.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
jliedu.com
www.customers.report.jliedu.com |
115 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
4 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
11 | www.customers.report.jliedu.com |
www.customers.report.jliedu.com
|
1 | cdnjs.cloudflare.com |
www.customers.report.jliedu.com
|
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
customers.report.jliedu.com customers.report.jliedu.com |
2021-12-22 - 2022-12-22 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-21 - 2022-09-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.customers.report.jliedu.com/
Frame ID: 6F1D69EA78EE4C4C7E4BB0108C2571EA
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Ebay_loginDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
animate.css (Web Frameworks) Expand
Detected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.customers.report.jliedu.com/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
www.customers.report.jliedu.com/assets/bootstrap/css/ |
152 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-all.min.css
www.customers.report.jliedu.com/assets/fonts/ |
53 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
www.customers.report.jliedu.com/assets/fonts/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome5-overrides.min.css
www.customers.report.jliedu.com/assets/fonts/ |
566 B 252 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
animate.min.css
cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/ |
52 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.min.css
www.customers.report.jliedu.com/assets/css/ |
2 KB 733 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
www.customers.report.jliedu.com/assets/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
orwith.png
www.customers.report.jliedu.com/assets/img/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vseal.gif
www.customers.report.jliedu.com/assets/img/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
www.customers.report.jliedu.com/assets/js/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
www.customers.report.jliedu.com/assets/bootstrap/js/ |
77 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: eBay (E-commerce)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
www.customers.report.jliedu.com
2606:4700::6810:135e
67.225.137.48
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
1147a5f580902aa84b9067d99e4d33b7d1ef4f1cd95eac05e189cfed2d717216
1715e0190409baf0bee4cbad8efe7516ee014f3b658cb4dcfc9d1eab07769b2e
7f3145c87d3570154f633975e8a4f8d30aa38603edaba145501e9c90ddbe186c
885e65be1afce51722ab3cc5d95da8f823a13697bc040da6fe0d424342acc211
8fe3fa119255adb5e0c12479331f9e092e85bcff56ab6ecc0510bfa2056b898d
a27a863da69c3436493c4481e2781513dec947df5eed572a3c76f6ed9fb6a475
a70f5fddd2e63548b2527f2621dc96003194e043f79f285d80287d3ce2428e7c
a9ce56cf7ddd8c6685ef99fd1301b3908f0db32bdc3d4eb6bacdf19fec00e618
df9cd9ad71b6e1cafb9f05410ad16ecd39f952ebedd0a4d3067e7e46d49eb9f1
f537dcc15672a675943639149926df3dfda5414d97fd126c7a49d69baa2b3812
f9ddd1e64827cb0fa09d74aa581ecfd468212261fa170ec9baddbd678389b342