delivery.attempt.failure.ebbs.co.za
Open in
urlscan Pro
41.185.8.221
Malicious Activity!
Public Scan
Effective URL: https://delivery.attempt.failure.ebbs.co.za/public/MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz
Submission: On November 21 via automatic, source openphish — Scanned from US
Summary
TLS certificate: Issued by R11 on October 16th 2024. Valid for: 3 months.
This is the only time delivery.attempt.failure.ebbs.co.za was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 20 | 41.185.8.221 41.185.8.221 | 36943 (ZA-1-Grid) (ZA-1-Grid) | |
1 | 2606:4700:440... 2606:4700:4400::6812:2844 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.21.234.144 104.21.234.144 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 13.33.252.108 13.33.252.108 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 18.164.96.46 18.164.96.46 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 104.198.23.205 104.198.23.205 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
29 | 8 |
ASN36943 (ZA-1-Grid, ZA)
PTR: srv149.hostserv.co.za
delivery.attempt.failure.ebbs.co.za |
ASN16509 (AMAZON-02, US)
PTR: server-13-33-252-108.jfk50.r.cloudfront.net
static.hotjar.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-164-96-46.jfk50.r.cloudfront.net
script.hotjar.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 205.23.198.104.bc.googleusercontent.com
r.lr-in.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
ebbs.co.za
3 redirects
delivery.attempt.failure.ebbs.co.za |
2 MB |
3 |
lr-in.com
cdn.lr-in.com — Cisco Umbrella Rank: 30037 r.lr-in.com — Cisco Umbrella Rank: 36411 |
140 KB |
2 |
hotjar.com
static.hotjar.com — Cisco Umbrella Rank: 888 script.hotjar.com — Cisco Umbrella Rank: 1185 |
61 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
82 KB |
1 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 2020 |
|
0 |
Failed
function sub() { [native code] }. Failed |
|
0 |
killbot.org
Failed
files.killbot.org Failed |
|
29 | 7 |
Domain | Requested by | |
---|---|---|
20 | delivery.attempt.failure.ebbs.co.za |
3 redirects
delivery.attempt.failure.ebbs.co.za
|
2 | r.lr-in.com |
cdn.lr-in.com
|
2 | cdnjs.cloudflare.com |
delivery.attempt.failure.ebbs.co.za
cdnjs.cloudflare.com |
1 | script.hotjar.com |
static.hotjar.com
|
1 | static.hotjar.com |
delivery.attempt.failure.ebbs.co.za
|
1 | cdn.lr-in.com |
delivery.attempt.failure.ebbs.co.za
|
1 | kit.fontawesome.com |
delivery.attempt.failure.ebbs.co.za
|
0 | invalid Failed |
delivery.attempt.failure.ebbs.co.za
|
0 | files.killbot.org Failed |
delivery.attempt.failure.ebbs.co.za
|
29 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
delivery.attempt.failure.ebbs.co.za R11 |
2024-10-16 - 2025-01-14 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-07-30 - 2025-01-27 |
6 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
lr-in.com WE1 |
2024-10-31 - 2025-01-29 |
3 months | crt.sh |
*.hotjar.com Amazon RSA 2048 M03 |
2024-05-22 - 2025-06-20 |
a year | crt.sh |
api.logrocket.com R10 |
2024-10-28 - 2025-01-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://delivery.attempt.failure.ebbs.co.za/public/MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz
Frame ID: A3D5EDBB4205A62D92ACE9675E29315D
Requests: 27 HTTP requests in this frame
Screenshot
Page Title
DHLPage URL History Show full URLs
-
https://delivery.attempt.failure.ebbs.co.za/public/Ylk7475TLjuVSz3ivyYunGxWnXeR1u2B
HTTP 302
https://delivery.attempt.failure.ebbs.co.za/public HTTP 301
https://delivery.attempt.failure.ebbs.co.za/public/ Page URL
-
https://delivery.attempt.failure.ebbs.co.za/MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz/
HTTP 301
https://delivery.attempt.failure.ebbs.co.za/public/MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz Page URL
Detected technologies
Laravel (Web Frameworks) ExpandDetected patterns
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Hotjar (Analytics) Expand
Detected patterns
- //static\.hotjar\.com/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://delivery.attempt.failure.ebbs.co.za/public/Ylk7475TLjuVSz3ivyYunGxWnXeR1u2B
HTTP 302
https://delivery.attempt.failure.ebbs.co.za/public HTTP 301
https://delivery.attempt.failure.ebbs.co.za/public/ Page URL
-
https://delivery.attempt.failure.ebbs.co.za/MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz/
HTTP 301
https://delivery.attempt.failure.ebbs.co.za/public/MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://delivery.attempt.failure.ebbs.co.za/public/Ylk7475TLjuVSz3ivyYunGxWnXeR1u2B HTTP 302
- https://delivery.attempt.failure.ebbs.co.za/public HTTP 301
- https://delivery.attempt.failure.ebbs.co.za/public/
29 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
delivery.attempt.failure.ebbs.co.za/public/ Redirect Chain
|
539 B 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
killbot-security.js
files.killbot.org/.cdn-cgi/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
MwYIFfhA4tli2Y92g54YFcGkQvPa81Fz
delivery.attempt.failure.ebbs.co.za/public/ Redirect Chain
|
59 KB 60 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f7165dd215.js
kit.fontawesome.com/ |
0 0 |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
killbot-security.js
files.killbot.org/.cdn-cgi/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
delivery.attempt.failure.ebbs.co.za/public/css/ |
429 KB 430 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logger-1.min.js
cdn.lr-in.com/ |
892 KB 140 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
invalid/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
delivery.attempt.failure.ebbs.co.za/images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.png
delivery.attempt.failure.ebbs.co.za/images/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foo.png
delivery.attempt.failure.ebbs.co.za/images/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
delivery.attempt.failure.ebbs.co.za/public/js/ |
2 MB 2 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
session-recorder.js
delivery.attempt.failure.ebbs.co.za/public/js/ |
44 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hotjar-2895475.js
static.hotjar.com/c/ |
13 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-latin-400-normal.woff2
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fontsource/roboto/files/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfa-brands-400.woff2
delivery.attempt.failure.ebbs.co.za/public/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfa-solid-900.woff2
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modules.86621fa4aeada5bcf025.js
script.hotjar.com/ |
222 KB 55 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-all-400-normal.woff
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fontsource/roboto/files/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfa-solid-900.woff
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfa-brands-400.woff
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
8e2196db-6ddb-48c7-be24-1f5b05bfeb7b
https://delivery.attempt.failure.ebbs.co.za/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfa-brands-400.ttf
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfa-solid-900.ttf
delivery.attempt.failure.ebbs.co.za/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
delivery.attempt.failure.ebbs.co.za/ |
0 103 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
i
r.lr-in.com/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
i
r.lr-in.com/ |
187 B 680 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- files.killbot.org
- URL
- https://files.killbot.org/.cdn-cgi/killbot-security.js
- Domain
- files.killbot.org
- URL
- https://files.killbot.org/.cdn-cgi/killbot-security.js
- Domain
- invalid
- URL
- chrome-extension://invalid/
- Domain
- delivery.attempt.failure.ebbs.co.za
- URL
- blob:https://delivery.attempt.failure.ebbs.co.za/8e2196db-6ddb-48c7-be24-1f5b05bfeb7b
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)32 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| redirect string| sessionHash function| hj object| _hjSettings object| regeneratorRuntime object| __SDKCONFIG__ function| _LRLogger object| hjSiteSettings object| hjLazyModules function| hjBootstrap object| hjBootstrapCalled object| webpackChunk function| jQuery function| $ object| ParsleyExtend object| ParsleyConfig object| psly object| Parsley object| ParsleyUtils object| ParsleyValidator object| ParsleyUI string| inputEventPatched object| intlTelInputUtils function| openNav function| closeNav function| _lrMutationObserver function| _lrXMLHttpRequest boolean| _lr_loaded object| bLogin function| Pusher object| Echo7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
delivery.attempt.failure.ebbs.co.za/ | Name: XSRF-TOKEN Value: eyJpdiI6IlZZN05pMTc5NjFvanNYZVBYSkF3UWc9PSIsInZhbHVlIjoiWTYrK24yKzV5M1pTMmk5OEQyVGcwUU11WWt6aitQeC9uWk53dmxvZHBhWkRDODg4Kzc4T0xmeUF0SXhTSVpnc2YwK0Zzd2V2ZXFOWnpBUlg3VXZZZTR5U3MzczQ0SDRDU0pSTzdUWTFSTXdVbjhpaVgxcm1ydjRWcndlOW5sRTUiLCJtYWMiOiI3NzcxNzFjNzk1Y2JkY2I0ZjY1NzQyNzRhNmViN2NlMzdmODU5YjQ0MGFjM2RjMWRlNjYwZmU1NDMwMDJkY2VlIiwidGFnIjoiIn0%3D |
|
delivery.attempt.failure.ebbs.co.za/ | Name: laravel_session Value: eyJpdiI6Ik1STFNoRTlMZDlTaVNlZVcvbHYrS0E9PSIsInZhbHVlIjoiL1YwTEFIMTR3Y3IzQWRVSnY1bVkzRlF6M3JBTTMxLzJwTTFWS3RiNFBaRU1wV2ZqQzFJSDBWQklDZjBPZndsbHRQNmxPbW4rZ2k5eXBIQndVb2MxWVl0cEZpR3BWZTFaVTVGVXNNWTZGY0VrRUErSTBxaTFQZVBuZWQyZXZMWW0iLCJtYWMiOiJjMDE5Y2JlYzcxMDE0OWRmNDRlYzk4ZGNhNWNkOTAzNjdhNzhlNDVkN2JkZTQzZDRkYWExMWRkYzc2YWU5ZDA4IiwidGFnIjoiIn0%3D |
|
delivery.attempt.failure.ebbs.co.za/ | Name: _lr_tabs_-mnnzup%2Fdus Value: {%22sessionID%22:0%2C%22recordingID%22:%225-37d70cea-a75e-4772-acba-3c80738be2d7%22%2C%22lastActivity%22:1732151744426%2C%22hasActivity%22:false} |
|
delivery.attempt.failure.ebbs.co.za/ | Name: _lr_hb_-mnnzup%2Fdus Value: {%22heartbeat%22:1732151744428} |
|
delivery.attempt.failure.ebbs.co.za/ | Name: _lr_uf_-mnnzup Value: 9cdc1ba5-c253-4a9a-84a9-95f972bc7385 |
|
.ebbs.co.za/ | Name: _hjSessionUser_2895475 Value: eyJpZCI6IjAzMGYyMjM4LTc1MTEtNWNkMC1iZjFmLWJlYjVkYjQ3MjAzYiIsImNyZWF0ZWQiOjE3MzIxNTE3NDQ0MzYsImV4aXN0aW5nIjp0cnVlfQ== |
|
.ebbs.co.za/ | Name: _hjSession_2895475 Value: eyJpZCI6IjBjMTY1ZTVlLTlkNjctNDVlMi1hNTdmLTBjN2Q4MjEwNzM1NCIsImMiOjE3MzIxNTE3NDQ0MzgsInMiOjEsInIiOjAsInNiIjowLCJzciI6MCwic2UiOjAsImZzIjoxLCJzcCI6MH0= |
15 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.lr-in.com
cdnjs.cloudflare.com
delivery.attempt.failure.ebbs.co.za
files.killbot.org
invalid
kit.fontawesome.com
r.lr-in.com
script.hotjar.com
static.hotjar.com
delivery.attempt.failure.ebbs.co.za
files.killbot.org
invalid
104.17.24.14
104.198.23.205
104.21.234.144
13.33.252.108
18.164.96.46
2606:4700:4400::6812:2844
41.185.8.221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