hkvq-i2ki-v.firebaseapp.com
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Submission: On March 15 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1D4 on March 7th 2023. Valid for: 3 months.
This is the only time hkvq-i2ki-v.firebaseapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: HDFC BankDomain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700:303... 2606:4700:3036::6815:5a60 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
firebaseapp.com
hkvq-i2ki-v.firebaseapp.com |
153 KB |
1 |
cdnvnet.com
visitor.cdnvnet.com |
581 B |
17 | 2 |
Domain | Requested by | |
---|---|---|
16 | hkvq-i2ki-v.firebaseapp.com |
hkvq-i2ki-v.firebaseapp.com
|
1 | visitor.cdnvnet.com |
hkvq-i2ki-v.firebaseapp.com
|
17 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
firebaseapp.com GTS CA 1D4 |
2023-03-07 - 2023-06-05 |
3 months | crt.sh |
*.cdnvnet.com GTS CA 1P5 |
2023-03-07 - 2023-06-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://hkvq-i2ki-v.firebaseapp.com/
Frame ID: F011FA89D1C51982934087CA5F944B3A
Requests: 20 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
hkvq-i2ki-v.firebaseapp.com/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a6cd15749f8dde69.css
hkvq-i2ki-v.firebaseapp.com/_next/static/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webpack-59c5c889f52620d6.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/ |
2 KB 873 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
framework-7751730b10fa0f74.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/ |
138 KB 39 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main-591bb7ec51acdc0d.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/ |
102 KB 27 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_app-1a336683ff51f334.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/pages/ |
916 B 785 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
345-9778382fb4c87e41.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index-faed9577dc1e907f.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/pages/ |
14 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_buildManifest.js
hkvq-i2ki-v.firebaseapp.com/_next/static/6BBl_syVuJTxTKW0F0Wnn/ |
1 KB 822 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_ssgManifest.js
hkvq-i2ki-v.firebaseapp.com/_next/static/6BBl_syVuJTxTKW0F0Wnn/ |
77 B 407 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
spinner.gif
hkvq-i2ki-v.firebaseapp.com/ |
79 KB 41 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
226-6d96280c1646a491.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/ |
74 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
865-06d029de40cb9d5f.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/ |
5 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
e1-f491fa90882200ef.js
hkvq-i2ki-v.firebaseapp.com/_next/static/chunks/pages/ |
4 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
afx.png
hkvq-i2ki-v.firebaseapp.com/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
nortonsecurity.png
hkvq-i2ki-v.firebaseapp.com/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
t.php
visitor.cdnvnet.com/ |
20 B 581 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
79 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
79 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: HDFC Bank11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| webpackChunk_N_E function| __next_require__ object| next object| __NEXT_DATA__ function| __SSG_MANIFEST_CB object| __NEXT_P undefined| _N_E object| __MIDDLEWARE_MATCHERS object| __BUILD_MANIFEST object| __SSG_MANIFEST0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hkvq-i2ki-v.firebaseapp.com
visitor.cdnvnet.com
2606:4700:3036::6815:5a60
2620:0:890::100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