tenderant.build067.wpsandbox.app
Open in
urlscan Pro
2606:4700:10::6816:4286
Malicious Activity!
Public Scan
Submission: On December 18 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on December 1st 2022. Valid for: 3 months.
This is the only time tenderant.build067.wpsandbox.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DPD (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:10:... 2606:4700:10::6816:4286 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2 |
ASN13335 (CLOUDFLARENET, US)
tenderant.build067.wpsandbox.app |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
wpsandbox.app
tenderant.build067.wpsandbox.app |
230 KB |
2 | 1 |
Domain | Requested by | |
---|---|---|
1 | tenderant.build067.wpsandbox.app |
tenderant.build067.wpsandbox.app
|
2 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
rizarichempire.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.build067.wpsandbox.app R3 |
2022-12-01 - 2023-03-01 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://tenderant.build067.wpsandbox.app/dpd/de/
Frame ID: 0EF55E8762AED462E0BA86FE291B571B
Requests: 12 HTTP requests in this frame
Frame:
https://tenderant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/scripts/alpha/invisible.js?ts=1671364800
Frame ID: 6C7053123633990B0CA791D25C0B32E8
Requests: 1 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
tenderant.build067.wpsandbox.app/dpd/de/ |
337 KB 230 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
597 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
572 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
564 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
657 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
187 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
44 KB 44 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
37 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
50 KB 50 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
75 KB 75 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
invisible.js
tenderant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/scripts/alpha/ Frame 6C70 |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- tenderant.build067.wpsandbox.app
- URL
- https://tenderant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/scripts/alpha/invisible.js?ts=1671364800
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DPD (Transportation)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontentvisibilityautostatechange0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
tenderant.build067.wpsandbox.app
tenderant.build067.wpsandbox.app
2606:4700:10::6816:4286
1dd20181a733ac6bad0e65d39105cd1fe1bdd5cb9f68341a82d7a206310a1290
255ac343be8acf31ca3debe1a89ecfeb7bf7949ca9bfcce726ec20db90d4ff71
291cb4d4ba35092b9b8bd849c7156784c4d15c7b6857da97fa41ae0b80e972b9
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
441985bca86f350bd89721c5219dbcee393f2d9b206930ba3997919a1f4d2e9c
a123b651c9caea90bfa0b9dd5c1df7ce16ed998ff8ee14801147f0113cc68a14
b07b4ba931d2ff580554dec6bcdad83977282139a2c2278df7b37eeb811c9ade
bf3d35d5cb9529e6a751dd854a9916e390be29855f04209c316a9ae8b2ceadb9
c1ff2532853664ecbc145f4dbc95fae8291a3ec722dbb0586b5a248790d9a52f
dceea27395ed1b2ab536cc460a7b398429d88232a11cea81458db125457a2b1c
f43887dd5ce2b17841bfd0b93b62b4bfb7dcb3b5c395b7c2052f208ff5edb972
fa4f0aed1d0ec5764d186315819d7d80651bf620bc6378a9745701ad501a4984