qantas.member-rewards.online
Open in
urlscan Pro
8.208.94.148
Malicious Activity!
Public Scan
Effective URL: https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/login/
Submission: On January 27 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by R3 on January 27th 2021. Valid for: 3 months.
This is the only time qantas.member-rewards.online was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Qantas (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 20 | 8.208.94.148 8.208.94.148 | 45102 (CNNIC-ALI...) (CNNIC-ALIBABA-US-NET-AP Alibaba (US) Technology Co.) | |
18 | 1 |
ASN45102 (CNNIC-ALIBABA-US-NET-AP Alibaba (US) Technology Co., Ltd., CN)
qantas.member-rewards.online |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
member-rewards.online
2 redirects
qantas.member-rewards.online |
608 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
20 | qantas.member-rewards.online |
2 redirects
qantas.member-rewards.online
|
18 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
qantas.member-rewards.online R3 |
2021-01-27 - 2021-04-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/login/
Frame ID: 73B51E8F6F75E4C78AB799525D64C068
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://qantas.member-rewards.online/ Page URL
-
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e
HTTP 301
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/ HTTP 302
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/login/ Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- html /<div class="[^"]*parbase/i
Java (Programming Languages) Expand
Detected patterns
- html /<div class="[^"]*parbase/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://qantas.member-rewards.online/ Page URL
-
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e
HTTP 301
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/ HTTP 302
https://qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
qantas.member-rewards.online/ |
728 B 699 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
qantas.member-rewards.online/frequent-flyer/8a4b261e2fde64e353c59028c2b9165e/login/ Redirect Chain
|
27 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
qantas.member-rewards.online/bower_components/jquery/dist/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
qantas.member-rewards.online/bower_components/ua-parser-js/dist/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
qantas.member-rewards.online/bower_components/font-awesome/css/ |
30 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
qantas.member-rewards.online/core/form/ |
16 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
qantas.member-rewards.online/core/form/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
qantas.member-rewards.online/login/form/ |
199 B 444 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.min.2a59980d09662444d23feab128b9acfa.css
qantas.member-rewards.online/login/ |
186 KB 186 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.bundle.css
qantas.member-rewards.online/login/ |
114 B 359 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
qantas.member-rewards.online/login/ |
50 KB 51 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-noncritical.min.7813760a0650572c476ec4027d786bfe.css
qantas.member-rewards.online/login/ |
65 KB 66 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
optanon.css
qantas.member-rewards.online/login/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
QANTAS-Centenary-24px.svg
qantas.member-rewards.online/login/ |
13 KB 13 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
qantas.member-rewards.online/login/form/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spritesheet-9632fb7044385395ce89846b873ea4e3.png
qantas.member-rewards.online/login/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
315CA1_3_0.woff2
qantas.member-rewards.online/login/ |
48 KB 49 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
315CA1_1_0.woff2
qantas.member-rewards.online/login/ |
49 KB 49 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Qantas (Transportation)35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| UAParser function| ask_def_proxy function| next__ function| preFinish__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| send1 string| bid object| php_js object| loader_ string| el2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
qantas.member-rewards.online/ | Name: bid Value: 8a4b261e2fde64e353c59028c2b9165e |
|
qantas.member-rewards.online/ | Name: real Value: OK |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
qantas.member-rewards.online
8.208.94.148
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
1e5c057c32de71d29c585b09b0562497b93c5f12c88214e79c81d2c2c8e6c398
39a2cf5d04df079c795ff8fbd5331af0ad118a3726ac317e3f1e8bcedc0071f3
3d9df5487d40efbc5b334204f8e5a34217b577ce7347ef5cb305066baf89a1ac
4ba0ad592a9744187492773b01f431117d77c17c540fbb5d151c2f14315d5885
564c11a6d2b5f6d64dbfcb00ef27a880cade69487f964361ceffb213f27436e5
71ed6d386b107b71653613a86944ad8f04fad6bceae9e761a21d5e60f956d226
75eee9dcf5bf3366fe5d7fcdf218a61f808d8ec2449983e74ed6ddc204fdda15
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
8ee72b870f333d99caf97671efaa921f9b64a772dc43898c360ef7e3d3c0c588
acfecce6970a2ec8db6bbf3a51bcec7b2936d8930b0b7c84a079a315adb7b6c3
b2b64e5d45e5f4911d34343f60b7d15ba57d7ce1e4cc5dd69ac424bb79d84455
b964d246defe2ccf6dd3a0d3887ac9d09325a866b94bd57732219406654698a2
c60c97bd96ccbb927f5683055b487579dda8afe7b9483f243dd94d36e76409ee
c836377b3f878bb339f820600c13435c8e88490e176bedf5af928c927b229353
e9f9e8a53c09fbb3b841ce400a6f9e9968a5108dcd301e7d0d7b1fc5d6a9d90b
fff0ec69660b4a0ecb28282fdae74f45f7481bc6ea36f922034ca95a8b8751f5