dostawdhl.com
Open in
urlscan Pro
2606:4700:3033::ac43:80d7
Malicious Activity!
Public Scan
Effective URL: https://dostawdhl.com/Jw6iK2zJ9/VRcw5b
Submission: On November 16 via manual from PL
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 16th 2020. Valid for: a year.
This is the only time dostawdhl.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayU (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 15 | 2606:4700:303... 2606:4700:3033::ac43:80d7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
dostawdhl.com
2 redirects
dostawdhl.com |
644 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
15 | dostawdhl.com |
2 redirects
dostawdhl.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-16 - 2021-11-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://dostawdhl.com/Jw6iK2zJ9/VRcw5b
Frame ID: 27C9495F2655A84BFA57FE83094FE079
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://dostawdhl.com/ux38?r7738910
HTTP 301
https://dostawdhl.com/ux38?r7738910 HTTP 302
https://dostawdhl.com/Jw6iK2zJ9/VRcw5b Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://dostawdhl.com/ux38?r7738910
HTTP 301
https://dostawdhl.com/ux38?r7738910 HTTP 302
https://dostawdhl.com/Jw6iK2zJ9/VRcw5b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
VRcw5b
dostawdhl.com/Jw6iK2zJ9/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cb5a6ca947cb27cacbcbaaae649c75ffc.css
dostawdhl.com/Jw6iK2zJ9/css/ |
38 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
dostawdhl.com/Jw6iK2zJ9/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
514dcbcee7263e99462d5b3826756847.jpg
dostawdhl.com/Jw6iK2zJ9/css/ |
59 KB 60 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
541844a001e92f98d65d1b52b09ce812.png
dostawdhl.com/Jw6iK2zJ9/css/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bb51009534b66ecea5443e155979e1cb.png
dostawdhl.com/Jw6iK2zJ9/css/ |
135 KB 135 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8a56280be7a5f292be01f03a4f5917fa.png
dostawdhl.com/Jw6iK2zJ9/css/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular-webfont.woff
dostawdhl.com/Jw6iK2zJ9/css/fonts/ |
87 KB 88 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-light-webfont.woff
dostawdhl.com/Jw6iK2zJ9/css/fonts/ |
84 KB 84 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-semibold-webfont.woff
dostawdhl.com/Jw6iK2zJ9/css/fonts/ |
89 KB 89 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PFBeauSansPro-Bold.woff
dostawdhl.com/Jw6iK2zJ9/css/fonts/ |
142 KB 136 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
online.php
dostawdhl.com/Jw6iK2zJ9/ |
0 617 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
online.php
dostawdhl.com/Jw6iK2zJ9/ |
0 305 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayU (Financial)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery object| e1d5a7d31 function| online7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dostawdhl.com/ | Name: PHPSESSID Value: eq42habg2fch2rl4or69h2ulp9 |
|
dostawdhl.com/Jw6iK2zJ9 | Name: 44667c192c6e7dc187ef7ad63114e1a3 Value: 1966031785 |
|
dostawdhl.com/Jw6iK2zJ9 | Name: a43a3ab69d161c599d33dbb64f19771a Value: 2239397684 |
|
.dostawdhl.com/ | Name: __cfduid Value: d838aa140ec324c47f209e793b9c7e6941605558863 |
|
dostawdhl.com/Jw6iK2zJ9 | Name: 328f2cbe1334ebc3433ad5937f15bcfa Value: 447095272 |
|
dostawdhl.com/Jw6iK2zJ9 | Name: 2ddc2911b84b50c1083523ae92d74e78 Value: 4040500205 |
|
dostawdhl.com/Jw6iK2zJ9 | Name: 58aa4e1a2f544a3a0e2a7a1d647e0029 Value: 3005871050 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dostawdhl.com
2606:4700:3033::ac43:80d7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