ird-process-online.me
Open in
urlscan Pro
194.147.87.183
Malicious Activity!
Public Scan
Submission: On August 25 via api from NZ — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 25th 2022. Valid for: 3 months.
This is the only time ird-process-online.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: NZ Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 194.147.87.183 194.147.87.183 | 49392 (ASBAXETN) (ASBAXETN) | |
2 | 138.235.100.13 138.235.100.13 | 4771 (SPARKNZ S...) (SPARKNZ Spark New Zealand Trading Ltd.) | |
2 | 138.235.100.12 138.235.100.12 | 4771 (SPARKNZ S...) (SPARKNZ Spark New Zealand Trading Ltd.) | |
1 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:806::2003 | 15169 (GOOGLE) (GOOGLE) | |
10 | 6 |
ASN49392 (ASBAXETN, RU)
PTR: mail.shzbxw.cn
ird-process-online.me |
ASN4771 (SPARKNZ Spark New Zealand Trading Ltd., NZ)
services.ird.govt.nz |
ASN4771 (SPARKNZ Spark New Zealand Trading Ltd., NZ)
myir.ird.govt.nz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ird.govt.nz
services.ird.govt.nz myir.ird.govt.nz |
15 KB |
3 |
ird-process-online.me
ird-process-online.me |
6 KB |
1 |
gstatic.com
fonts.gstatic.com |
16 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 54 |
1 KB |
0 |
jquery.com
Failed
code.jquery.com Failed |
|
10 | 5 |
Domain | Requested by | |
---|---|---|
3 | ird-process-online.me |
ird-process-online.me
|
2 | myir.ird.govt.nz |
ird-process-online.me
|
2 | services.ird.govt.nz |
ird-process-online.me
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
ird-process-online.me
|
0 | code.jquery.com Failed |
ird-process-online.me
|
10 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ird.govt.nz |
www.govt.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ird-process-online.me R3 |
2022-08-25 - 2022-11-23 |
3 months | crt.sh |
services.ird.govt.nz DigiCert TLS RSA SHA256 2020 CA1 |
2021-12-21 - 2022-12-16 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-08-01 - 2022-10-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ird-process-online.me/pay/6307ea65151cb
Frame ID: 0530F32DB0C1DEE29B0C20A28EEDF287
Requests: 10 HTTP requests in this frame
2 Outgoing links
These are links going to different origins than the main page.
Title: Inland Revenue homepage
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
6307ea65151cb
ird-process-online.me/pay/ |
29 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-myir-lg.png
services.ird.govt.nz/irsso/resources/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout.gif
myir.ird.govt.nz/ |
43 B 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
oam_logout_success
myir.ird.govt.nz/ |
114 B 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
New_Zealand_Government_logo.svg
services.ird.govt.nz/irsso/resources/img/ |
6 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-3.0.0.min.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
online
ird-process-online.me/user/ |
0 0 |
Fetch
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
online
ird-process-online.me/user/ |
0 0 |
Fetch
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- code.jquery.com
- URL
- http://code.jquery.com/jquery-3.0.0.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: NZ Government (Government)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ird-process-online.me/ | Name: PHPSESSID Value: eesegoopc3piq76gt7c16olv96 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
ird-process-online.me
myir.ird.govt.nz
services.ird.govt.nz
code.jquery.com
138.235.100.12
138.235.100.13
194.147.87.183
2a00:1450:4001:806::2003
2a00:1450:4001:829::200a
4d407be54018aec8b0377456de982568ba3e889643af298bc411a306f089562f
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
a867943372f6f7a9ad62e54eef1fc0116dea05e68873c9b886cc0ba05cd0ec2b
af938d85dfdf56a4ca29be6716f0ce4f16f62243120556cb87682b96ac26123f
ed03cfdd7cc2ccff2d5c4ef07b3f3c554346e0b26f972049640f124e42829e89
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615
fbfb1bf42d418452315de8301ef432394c659a08425385577cf9526d0a50b1b9