kehai-valve.com
Open in
urlscan Pro
192.254.189.167
Malicious Activity!
Public Scan
Effective URL: https://kehai-valve.com/assets/home/MyGov/Re/Login.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXB...
Submission: On January 25 via manual from HK — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 18th 2023. Valid for: 3 months.
This is the only time kehai-valve.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 220.158.142.147 220.158.142.147 | 132556 (BLUELOTUS...) (BLUELOTUS-AS Blue Lotus Support Services Pvt Ltd) | |
3 7 | 192.254.189.167 192.254.189.167 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
4 | 2 |
ASN132556 (BLUELOTUS-AS Blue Lotus Support Services Pvt Ltd, IN)
PTR: ns2.blss.in.142.158.220.in-addr.arpa
slingcard.in |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 192-254-189-167.unifiedlayer.com
kehai-valve.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
kehai-valve.com
3 redirects
kehai-valve.com |
382 KB |
1 |
slingcard.in
1 redirects
slingcard.in |
256 B |
4 | 2 |
Domain | Requested by | |
---|---|---|
7 | kehai-valve.com |
3 redirects
kehai-valve.com
|
1 | slingcard.in | 1 redirects |
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
kehai-valve.com R3 |
2023-01-18 - 2023-04-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://kehai-valve.com/assets/home/MyGov/Re/Login.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzEwOS4wLjU0MTQuNzQgU2FmYXJpLzUzNy4zNjIxNy4xMTQuMjE4LjIzMjAyMzpKYW46VHVl
Frame ID: 84624B3E6B5BFDE781694EF00CE4AD15
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign in with myGov - myGovPage URL History Show full URLs
-
http://slingcard.in/paodeekslopali1/paodeekslopali2//
HTTP 302
https://kehai-valve.com/assets/home/MyGov/ HTTP 302
https://kehai-valve.com/assets/home/MyGov/Re?caller=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7... HTTP 301
https://kehai-valve.com/assets/home/MyGov/Re/?caller=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ... HTTP 302
https://kehai-valve.com/assets/home/MyGov/Re/Login.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDs... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://slingcard.in/paodeekslopali1/paodeekslopali2//
HTTP 302
https://kehai-valve.com/assets/home/MyGov/ HTTP 302
https://kehai-valve.com/assets/home/MyGov/Re?caller=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzEwOS4wLjU0MTQuNzQgU2FmYXJpLzUzNy4zNjIxNy4xMTQuMjE4LjIzMjAyMzpKYW46VHVl HTTP 301
https://kehai-valve.com/assets/home/MyGov/Re/?caller=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzEwOS4wLjU0MTQuNzQgU2FmYXJpLzUzNy4zNjIxNy4xMTQuMjE4LjIzMjAyMzpKYW46VHVl HTTP 302
https://kehai-valve.com/assets/home/MyGov/Re/Login.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzEwOS4wLjU0MTQuNzQgU2FmYXJpLzUzNy4zNjIxNy4xMTQuMjE4LjIzMjAyMzpKYW46VHVl Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Login.php
kehai-valve.com/assets/home/MyGov/Re/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
kehai-valve.com/assets/home/MyGov/Re/ |
471 KB 253 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-black.svg
kehai-valve.com/assets/home/MyGov/Re/assets/ |
63 KB 63 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-white.svg
kehai-valve.com/assets/home/MyGov/Re/assets/ |
63 KB 63 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
256 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
583 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
kehai-valve.com/ | Name: PHPSESSID Value: 02d1bd74b8c171071ba0306d36a65c61 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kehai-valve.com
slingcard.in
192.254.189.167
220.158.142.147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