hdky-1cb14.firebaseapp.com
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Effective URL: https://hdky-1cb14.firebaseapp.com/
Submission: On April 06 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1D4 on March 7th 2023. Valid for: 3 months.
This is the only time hdky-1cb14.firebaseapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: HDFC BankDomain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 17 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700:303... 2606:4700:3035::6815:9b9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
firebaseapp.com
1 redirects
hdky-1cb14.firebaseapp.com |
153 KB |
1 |
9appsdownload.org
ns2.9appsdownload.org |
576 B |
17 | 2 |
Domain | Requested by | |
---|---|---|
17 | hdky-1cb14.firebaseapp.com |
1 redirects
hdky-1cb14.firebaseapp.com
|
1 | ns2.9appsdownload.org |
hdky-1cb14.firebaseapp.com
|
17 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
firebaseapp.com GTS CA 1D4 |
2023-03-07 - 2023-06-05 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-03-22 - 2024-03-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://hdky-1cb14.firebaseapp.com/
Frame ID: E446EA28431B7BF5DA313264498C8D82
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
WellcomePage URL History Show full URLs
-
http://hdky-1cb14.firebaseapp.com/
HTTP 301
https://hdky-1cb14.firebaseapp.com/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://hdky-1cb14.firebaseapp.com/
HTTP 301
https://hdky-1cb14.firebaseapp.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
hdky-1cb14.firebaseapp.com/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e17c3f74034532b0.css
hdky-1cb14.firebaseapp.com/_next/static/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webpack-59c5c889f52620d6.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/ |
2 KB 856 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
framework-7751730b10fa0f74.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/ |
138 KB 39 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main-591bb7ec51acdc0d.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/ |
102 KB 27 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_app-1a336683ff51f334.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/pages/ |
917 B 787 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
345-9778382fb4c87e41.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index-461061f438c1bc00.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/pages/ |
14 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_buildManifest.js
hdky-1cb14.firebaseapp.com/_next/static/RO0rtfiRQbNvbiK2MCV0g/ |
1 KB 783 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_ssgManifest.js
hdky-1cb14.firebaseapp.com/_next/static/RO0rtfiRQbNvbiK2MCV0g/ |
78 B 410 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
spinner.gif
hdky-1cb14.firebaseapp.com/ |
79 KB 41 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
226-6d96280c1646a491.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/ |
74 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
865-c5697aa85744d1b2.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/ |
5 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f1-349fe24ea8051998.js
hdky-1cb14.firebaseapp.com/_next/static/chunks/pages/ |
4 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
afx.png
hdky-1cb14.firebaseapp.com/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
nortonsecurity.png
hdky-1cb14.firebaseapp.com/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
token.php
ns2.9appsdownload.org/ |
20 B 576 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
79 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
79 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: HDFC Bank11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| webpackChunk_N_E function| __next_require__ object| next object| __NEXT_DATA__ function| __SSG_MANIFEST_CB object| __NEXT_P object| _N_E object| __MIDDLEWARE_MATCHERS object| __BUILD_MANIFEST object| __SSG_MANIFEST0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hdky-1cb14.firebaseapp.com
ns2.9appsdownload.org
2606:4700:3035::6815:9b9
2620:0:890::100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