api0944.herokuapp.com
Open in
urlscan Pro
3.227.29.88
Malicious Activity!
Public Scan
Effective URL: https://api0944.herokuapp.com/?email=johnlaurens@dbs.com
Submission: On July 21 via api from SG
Summary
TLS certificate: Issued by Amazon on May 29th 2021. Valid for: a year.
This is the only time api0944.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DBS Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.122 167.89.123.122 | 11377 (SENDGRID) (SENDGRID) | |
1 | 54.156.72.145 54.156.72.145 | 14618 (AMAZON-AES) (AMAZON-AES) | |
6 | 3.227.29.88 3.227.29.88 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2a00:1450:400... 2a00:1450:4001:831::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 13.226.145.67 13.226.145.67 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 2a00:1450:400... 2a00:1450:4001:811::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 6 |
ASN11377 (SENDGRID, US)
PTR: o16789123x122.outbound-mail.sendgrid.net
u22732916.ct.sendgrid.net |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-156-72-145.compute-1.amazonaws.com
api440997.herokuapp.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-227-29-88.compute-1.amazonaws.com
api0944.herokuapp.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-226-145-67.dus51.r.cloudfront.net
logo.clearbit.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
herokuapp.com
api440997.herokuapp.com api0944.herokuapp.com |
388 KB |
2 |
gstatic.com
fonts.gstatic.com |
46 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
83 KB |
1 |
clearbit.com
logo.clearbit.com |
11 KB |
1 |
googleapis.com
fonts.googleapis.com |
523 B |
1 |
sendgrid.net
1 redirects
u22732916.ct.sendgrid.net |
260 B |
13 | 6 |
Domain | Requested by | |
---|---|---|
6 | api0944.herokuapp.com |
api440997.herokuapp.com
api0944.herokuapp.com |
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | stackpath.bootstrapcdn.com |
api0944.herokuapp.com
stackpath.bootstrapcdn.com |
1 | logo.clearbit.com |
api0944.herokuapp.com
|
1 | fonts.googleapis.com |
api0944.herokuapp.com
|
1 | api440997.herokuapp.com | |
1 | u22732916.ct.sendgrid.net | 1 redirects |
13 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.herokuapp.com Amazon |
2021-05-29 - 2022-06-27 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-06-28 - 2021-09-20 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
clearbit.com Amazon |
2021-04-22 - 2022-05-21 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-06-22 - 2021-09-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://api0944.herokuapp.com/?email=johnlaurens@dbs.com
Frame ID: 8338839324C3F0A8E278D318F82F08B0
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u22732916.ct.sendgrid.net/ls/click?upn=qytTTP3GhwVZzf5ZkdKUM5NdQDWSAlBL0HnT-2FGXRCj6mUN8ayfF1GF4kLu5pS...
HTTP 302
https://api440997.herokuapp.com/?email=johnlaurens@dbs.com Page URL
- https://api0944.herokuapp.com/?email=johnlaurens@dbs.com Page URL
Detected technologies
Python (Programming Languages) ExpandDetected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Django (Web Frameworks) Expand
Detected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u22732916.ct.sendgrid.net/ls/click?upn=qytTTP3GhwVZzf5ZkdKUM5NdQDWSAlBL0HnT-2FGXRCj6mUN8ayfF1GF4kLu5pSffvbshzQotpJ-2BL9JkVUxvXBoz2fEQ3hMDsAgy-2BLZT0XLZc-3D0xPM_aoF7kf-2FwppJGDOO8FZM0YhnY-2F26g13yhRW3f-2FJzIZByg8X9WDKbWpLupcA6rgZO-2F0Dp7nXuRefdUvxLOJKZ9K94-2BxqN7IvJgJc0K9d4-2FHY50A-2B8WV4AxNwqTdXXyTZG4yMqzty8xTBRjE-2FTYph0BtmljAdbZBaIpIUzyCePhyTVVrRdB-2F4EJECBcYdrltkZ5PkDVosXZYBLNOi5JKRB5lLR1n4rmeixgBGy9qriz9-2BQ-3D
HTTP 302
https://api440997.herokuapp.com/?email=johnlaurens@dbs.com Page URL
- https://api0944.herokuapp.com/?email=johnlaurens@dbs.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://u22732916.ct.sendgrid.net/ls/click?upn=qytTTP3GhwVZzf5ZkdKUM5NdQDWSAlBL0HnT-2FGXRCj6mUN8ayfF1GF4kLu5pSffvbshzQotpJ-2BL9JkVUxvXBoz2fEQ3hMDsAgy-2BLZT0XLZc-3D0xPM_aoF7kf-2FwppJGDOO8FZM0YhnY-2F26g13yhRW3f-2FJzIZByg8X9WDKbWpLupcA6rgZO-2F0Dp7nXuRefdUvxLOJKZ9K94-2BxqN7IvJgJc0K9d4-2FHY50A-2B8WV4AxNwqTdXXyTZG4yMqzty8xTBRjE-2FTYph0BtmljAdbZBaIpIUzyCePhyTVVrRdB-2F4EJECBcYdrltkZ5PkDVosXZYBLNOi5JKRB5lLR1n4rmeixgBGy9qriz9-2BQ-3D HTTP 302
- https://api440997.herokuapp.com/?email=johnlaurens@dbs.com
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
api440997.herokuapp.com/ Redirect Chain
|
459 B 651 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
/
api0944.herokuapp.com/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 523 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
api0944.herokuapp.com/static/css/ |
218 KB 218 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dbs.com
logo.clearbit.com/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
api0944.herokuapp.com/static/js/ |
86 KB 86 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.js
api0944.herokuapp.com/static/js/ |
21 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
api0944.herokuapp.com/static/js/ |
57 KB 57 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
api0944.herokuapp.com/static/js/ |
45 B 360 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v17/ |
22 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v17/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
stackpath.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DBS Bank (Banking)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| Popper object| bootstrap number| myVar function| myFunction function| showPage1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
api0944.herokuapp.com/ | Name: csrftoken Value: sezjVmsDGwSz9wbdTO9175pmRqzL8lp12kOpuROmSV3iz0KNc9wkuVw4RrlpFu3Z |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api0944.herokuapp.com
api440997.herokuapp.com
fonts.googleapis.com
fonts.gstatic.com
logo.clearbit.com
stackpath.bootstrapcdn.com
u22732916.ct.sendgrid.net
13.226.145.67
167.89.123.122
2606:4700::6812:acf
2a00:1450:4001:811::2003
2a00:1450:4001:831::200a
3.227.29.88
54.156.72.145
09b79d8b7062df5a53d682a0258e638a30f1cc3be42ad6c200a109ea03d91c11
0a34a87842c539c1f4feec56bba982fd596b73500046a6e6fe38a22260c6577b
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
4c24dfd28784ad2befb3dafaac6bf1ed4e7cd58cce713d9a0b228d426e812baf
65767c864ba004bfbec22417f07411188e53815418c1b01897a5d435123dc978
68d77805fed2346f803a43f932e0569d663d2d33938727c8f21a40de6ee4f77c
6ff679f85f43289d50c37c835855b3c447039f7b0c795fa31c14cf6d6834f426
71ef7c16d75da75a5d417df75ed72144bc5ec65a9c0429b7dee0988adc3e8d29
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
8d3ca80fa271e94b0c36cf3053b0f806b7a42bb3395b424c99dc0bd218f0ac20
a1361bb754cd6ae7ea6e6cef9532903ad2bad230f006b9651d5defbc8e3b6c68
b986d972f68bacc7cf97ce24775b28bdbf8c75061742eace3d244d25a8dbe478
c3c0d3f472358aac78455515c4800771426770c22698e2486d39fdb5505634e1