payments.resonancehyderabad.com
Open in
urlscan Pro
162.241.123.59
Malicious Activity!
Public Scan
Effective URL: https://payments.resonancehyderabad.com/CA/CA/home/DL-infos.php
Submission: On December 28 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on November 12th 2022. Valid for: 3 months.
This is the only time payments.resonancehyderabad.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 151.101.65.195 151.101.65.195 | 54113 (FASTLY) (FASTLY) | |
1 5 | 162.241.123.59 162.241.123.59 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
4 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-123-59.unifiedlayer.com
payments.resonancehyderabad.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
resonancehyderabad.com
1 redirects
payments.resonancehyderabad.com |
282 KB |
1 |
ayo.ba
1 redirects
ayo.ba |
1 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
5 | payments.resonancehyderabad.com |
1 redirects
payments.resonancehyderabad.com
|
1 | ayo.ba | 1 redirects |
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.blog.resonancehyderabad.com R3 |
2022-11-12 - 2023-02-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://payments.resonancehyderabad.com/CA/CA/home/DL-infos.php
Frame ID: 9D32126C301AF1826CCA0BA9AA607535
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
DHL Private Customersiconmonstr-menu-1loginlogged-inarrow-link-rightsearchsearchloginlogged-inarrow-down-02arrow-up-02searchfacebooktwitterinstagramyoutubelinkedinxingnewsletterPage URL History Show full URLs
-
https://ayo.ba/l/tsym
HTTP 302
https://payments.resonancehyderabad.com/CA/ HTTP 302
https://payments.resonancehyderabad.com/CA/CA/home/DL-infos.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ayo.ba/l/tsym
HTTP 302
https://payments.resonancehyderabad.com/CA/ HTTP 302
https://payments.resonancehyderabad.com/CA/CA/home/DL-infos.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
DL-infos.php
payments.resonancehyderabad.com/CA/CA/home/ Redirect Chain
|
308 KB 188 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
36 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
36 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
payments.resonancehyderabad.com/CA/CA/home/DL_files/ |
86 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
imask.min.js
payments.resonancehyderabad.com/CA/CA/home/DL_files/ |
45 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
infos.js
payments.resonancehyderabad.com/CA/CA/home/DL_files/ |
95 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery object| __core-js_shared__ object| core function| IMask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
payments.resonancehyderabad.com/ | Name: PHPSESSID Value: 05f69a0c66e5df5a0cb89855a313d244 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ayo.ba
payments.resonancehyderabad.com
151.101.65.195
162.241.123.59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