Submitted URL: https://rebrand.ly/v3x0gdo
Effective URL: https://chinapoint.in/js/script/java/Home/
Submission: On August 09 via manual from IN — Scanned from DE

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 103.53.42.238, located in India and belongs to PUBLIC-DOMAIN-REGISTRY, US. The main domain is chinapoint.in.
TLS certificate: Issued by R3 on July 8th 2022. Valid for: 3 months.
This is the only time chinapoint.in was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Standard Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 3.224.10.203 14618 (AMAZON-AES)
1 5 103.53.42.238 394695 (PUBLIC-DO...)
4 1
Apex Domain
Subdomains
Transfer
5 chinapoint.in
chinapoint.in
19 KB
1 rebrand.ly
rebrand.ly — Cisco Umbrella Rank: 66706
301 B
4 2
Domain Requested by
5 chinapoint.in 1 redirects chinapoint.in
1 rebrand.ly 1 redirects
4 2

This site contains no links.

Subject Issuer Validity Valid
chinapoint.in
R3
2022-07-08 -
2022-10-06
3 months crt.sh

This page contains 1 frames:

Primary Page: https://chinapoint.in/js/script/java/Home/
Frame ID: 7E4499B406FCF00362F5813940151D62
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Sign in

Page URL History Show full URLs

  1. https://rebrand.ly/v3x0gdo HTTP 301
    https://chinapoint.in/js/script/java/Home HTTP 301
    https://chinapoint.in/js/script/java/Home/ Page URL

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

19 kB
Transfer

66 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://rebrand.ly/v3x0gdo HTTP 301
    https://chinapoint.in/js/script/java/Home HTTP 301
    https://chinapoint.in/js/script/java/Home/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
chinapoint.in/js/script/java/Home/
Redirect Chain
  • https://rebrand.ly/v3x0gdo
  • https://chinapoint.in/js/script/java/Home
  • https://chinapoint.in/js/script/java/Home/
19 KB
5 KB
Document
General
Full URL
https://chinapoint.in/js/script/java/Home/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
103.53.42.238 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
Software
Apache /
Resource Hash
c74c4d3256885d68376c773da168081a3fef1f933cf9be317602bfc66373ca83

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-encoding
gzip
content-length
4939
content-type
text/html; charset=UTF-8
date
Tue, 09 Aug 2022 07:01:16 GMT
server
Apache
vary
Accept-Encoding

Redirect headers

content-length
250
content-type
text/html; charset=iso-8859-1
date
Tue, 09 Aug 2022 07:01:16 GMT
location
https://chinapoint.in/js/script/java/Home/
server
Apache
ionic.bundle.css
chinapoint.in/js/script/java/Home/222_files/
19 KB
4 KB
Stylesheet
General
Full URL
https://chinapoint.in/js/script/java/Home/222_files/ionic.bundle.css
Requested by
Host: chinapoint.in
URL: https://chinapoint.in/js/script/java/Home/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
103.53.42.238 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
Software
Apache /
Resource Hash
3789296a3c60f4cfa82fd3c139d1d7ef968a06a4bab871f679562121a5869b44

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://chinapoint.in/js/script/java/Home/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36

Response headers

date
Tue, 09 Aug 2022 07:01:16 GMT
content-encoding
gzip
last-modified
Thu, 21 Jul 2022 02:44:34 GMT
server
Apache
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
4442
sbg.css
chinapoint.in/js/script/java/Home/222_files/
25 KB
7 KB
Stylesheet
General
Full URL
https://chinapoint.in/js/script/java/Home/222_files/sbg.css
Requested by
Host: chinapoint.in
URL: https://chinapoint.in/js/script/java/Home/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
103.53.42.238 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
Software
Apache /
Resource Hash
ee6bceb890a36327cd9f27d21963aa96ec9ff5f32369fb69d183178718095051

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://chinapoint.in/js/script/java/Home/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36

Response headers

date
Tue, 09 Aug 2022 07:01:16 GMT
content-encoding
gzip
last-modified
Thu, 21 Jul 2022 02:44:34 GMT
server
Apache
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
6653
sbg.png
chinapoint.in/js/script/java/Home/222_files/
3 KB
3 KB
Image
General
Full URL
https://chinapoint.in/js/script/java/Home/222_files/sbg.png
Requested by
Host: chinapoint.in
URL: https://chinapoint.in/js/script/java/Home/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
103.53.42.238 , India, ASN394695 (PUBLIC-DOMAIN-REGISTRY, US),
Reverse DNS
Software
Apache /
Resource Hash
1a3aac076d48e18c6bd7547ca190a9b705f78d38cfc61e5a00f391b642c5adab

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://chinapoint.in/js/script/java/Home/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36

Response headers

date
Tue, 09 Aug 2022 07:01:16 GMT
last-modified
Thu, 21 Jul 2022 02:44:34 GMT
server
Apache
accept-ranges
bytes
content-length
3502
content-type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Standard Bank (Banking)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| animateLabel function| removeAnimation

0 Cookies