www.gabishkhanal.com.np
Open in
urlscan Pro
2606:4700:30::6812:260d
Malicious Activity!
Public Scan
Submission: On April 17 via automatic, source openphish
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on April 3rd 2019. Valid for: 6 months.
This is the only time www.gabishkhanal.com.np was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation) Alibaba (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 2606:4700:30:... 2606:4700:30::6812:260d | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
10 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.gabishkhanal.com.np |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
gabishkhanal.com.np
www.gabishkhanal.com.np |
569 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.gabishkhanal.com.np |
www.gabishkhanal.com.np
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni240555.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-04-03 - 2019-10-10 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.gabishkhanal.com.np/doc/tracking.php
Frame ID: D2D529942246C2E68462D2F9CF9EBFC8
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
tracking.php
www.gabishkhanal.com.np/doc/ |
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpg
www.gabishkhanal.com.np/doc/DHL_files/ |
55 KB 55 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img10.jpg
www.gabishkhanal.com.np/doc/DHL_files/ |
35 KB 35 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
163.jpg
www.gabishkhanal.com.np/doc/DHL_files/ |
13 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
globalsources.gif
www.gabishkhanal.com.np/doc/DHL_files/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hotmail.jpg
www.gabishkhanal.com.np/doc/DHL_files/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yahoo.png
www.gabishkhanal.com.np/doc/DHL_files/ |
120 KB 120 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yeah.gif
www.gabishkhanal.com.np/doc/DHL_files/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
126.gif
www.gabishkhanal.com.np/doc/DHL_files/ |
6 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alibaba.png
www.gabishkhanal.com.np/doc/DHL_files/ |
327 KB 328 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation) Alibaba (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.gabishkhanal.com.np/ | Name: __cfduid Value: d3765215c6dd5e30d5c8d12d43d844a551555502389 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.gabishkhanal.com.np
2606:4700:30::6812:260d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