ingenioussolutions.com.pk
Open in
urlscan Pro
192.254.189.233
Malicious Activity!
Public Scan
Effective URL: https://ingenioussolutions.com.pk/excel/?&email=
Submission Tags: falconsandbox
Submission: On July 11 via api from US — Scanned from CA
Summary
TLS certificate: Issued by R3 on July 9th 2023. Valid for: 3 months.
This is the only time ingenioussolutions.com.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 192.99.103.243 192.99.103.243 | 16276 (OVH) (OVH) | |
3 | 192.254.189.233 192.254.189.233 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
5 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 192-254-189-233.unifiedlayer.com
ingenioussolutions.com.pk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
ingenioussolutions.com.pk
ingenioussolutions.com.pk |
38 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 749 |
83 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 274 |
6 KB |
1 |
cuidamed.net
1 redirects
www.cuidamed.net |
259 B |
5 | 4 |
Domain | Requested by | |
---|---|---|
3 | ingenioussolutions.com.pk |
ingenioussolutions.com.pk
|
1 | code.jquery.com |
ingenioussolutions.com.pk
|
1 | cdnjs.cloudflare.com |
ingenioussolutions.com.pk
|
1 | www.cuidamed.net | 1 redirects |
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.ingenioussolutions.com.pk R3 |
2023-07-09 - 2023-10-07 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://ingenioussolutions.com.pk/excel/?&email=
Frame ID: B8D6C8A354E470CBD770271259532647
Requests: 8 HTTP requests in this frame
Frame:
https://ingenioussolutions.com.pk/excel/11111111111Sign%20in%20Office365%20Excel_files/view.html
Frame ID: 3992E3622C77F7297C41CE545B470199
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Sign in Office365 ExcelPage URL History Show full URLs
-
https://www.cuidamed.net/.well-known/aa/?kpo
HTTP 302
https://ingenioussolutions.com.pk/excel/?&email= Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.cuidamed.net/.well-known/aa/?kpo
HTTP 302
https://ingenioussolutions.com.pk/excel/?&email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ingenioussolutions.com.pk/excel/ Redirect Chain
|
61 KB 38 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.0.js
code.jquery.com/ |
281 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ingenioussolutions.com.pk/excel/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
view.html
ingenioussolutions.com.pk/excel/11111111111Sign%20in%20Office365%20Excel_files/ Frame 3992 |
746 B 494 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
709 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Excel / PDF download (Online)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend function| $ function| jQuery object| url string| hash string| hasherror string| email string| error undefined| msg object| alertt function| showEl function| hideEl0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
ingenioussolutions.com.pk
www.cuidamed.net
192.254.189.233
192.99.103.243
2001:4de0:ac18::1:a:1b
2606:4700::6811:190e
0563dd6673255423abcbfaa4780e3cfa14541a99d7882adfdd31add763251674
4dcdcda6574cbd484f47266b5572a8689bb2b5f06fe1f8218f1b6a0578845014
63c52aa99ca361b59a27e7f51fe5fadffef99e671f8b4f9560fab204219e0666
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
94177f23519911260b6f1b3d9ba1e6dd6627092d80ef0e6c8b6d1e2db056b8ed
9f73ee9c941bbeb0f33b6771b0a26329a17d620babd3a63c78b8bc4bf73b4d5f
aff01a147aeccc9b70a5efad1f2362fd709f3316296ec460d94aa7d31decdb37
f627e31d717594dc9cc5c7c7e0971b5c87b0cd40b3932609c0f068729a3e7d0b