eplanning.melawikab.go.id
Open in
urlscan Pro
103.134.19.183
Malicious Activity!
Public Scan
Submission: On March 25 via api from US — Scanned from US
Summary
This is the only time eplanning.melawikab.go.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Swiss Post (Transportation) DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 15 | 103.134.19.183 103.134.19.183 | 138141 (IDNIC-BRO...) (IDNIC-BROTHER-AS-ID PT. Waluya Istana Nusantara) | |
13 | 1 |
ASN138141 (IDNIC-BROTHER-AS-ID PT. Waluya Istana Nusantara, ID)
eplanning.melawikab.go.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
melawikab.go.id
2 redirects
eplanning.melawikab.go.id |
715 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
15 | eplanning.melawikab.go.id |
2 redirects
eplanning.melawikab.go.id
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://eplanning.melawikab.go.id/chde/trace/info.php
Frame ID: C40DAB23A19CFF0E89E4F4A9C35A941A
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
DHL-ExpressPage URL History Show full URLs
-
http://eplanning.melawikab.go.id/chde/trace/info.php
HTTP 302
http://eplanning.melawikab.go.id/chde/trace/index.php HTTP 302
http://eplanning.melawikab.go.id/chde/trace/info.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://eplanning.melawikab.go.id/chde/trace/info.php
HTTP 302
http://eplanning.melawikab.go.id/chde/trace/index.php HTTP 302
http://eplanning.melawikab.go.id/chde/trace/info.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
info.php
eplanning.melawikab.go.id/chde/trace/ Redirect Chain
|
24 KB 24 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
eplanning.melawikab.go.id/chde/trace/files/css/ |
529 KB 529 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
eplanning.melawikab.go.id/chde/trace/files/js/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhl-logo.svg
eplanning.melawikab.go.id/chde/trace/files/img/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glo.svg
eplanning.melawikab.go.id/chde/trace/files/img/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glo-footer-logo.svg
eplanning.melawikab.go.id/chde/trace/files/img/ |
12 KB 12 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5132a7ca80ea9e18ec8cecc618cf5a0b.woff
eplanning.melawikab.go.id/chde/trace/files/assets/fonts/ |
8 KB 9 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
eplanning.melawikab.go.id/chde/trace/files/img/ |
311 B 556 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lod.gif
eplanning.melawikab.go.id/chde/trace/files/img/ |
17 KB 17 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c2d3739d2debffea340a58b7b8ab3c61.woff
eplanning.melawikab.go.id/chde/trace/files/assets/fonts/ |
8 KB 9 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d2c082a9f78e61ea7ccefecaca4da8a3.woff
eplanning.melawikab.go.id/chde/trace/files/assets/fonts/ |
8 KB 9 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
03f859bf58e4d37841070de34be7d978.woff
eplanning.melawikab.go.id/chde/trace/files/assets/fonts/ |
8 KB 8 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
e39bd2e2657ce5dd6f9c33df18529233.woff
eplanning.melawikab.go.id/chde/trace/files/assets/fonts/ |
8 KB 8 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Swiss Post (Transportation) DHL (Transportation)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery undefined| request2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
eplanning.melawikab.go.id/ | Name: PHPSESSID Value: i120gglhecuuk380ecb0lrffb2 |
|
eplanning.melawikab.go.id/ | Name: khatulistiwa Value: b6be0a75f58de64e2ad1c4d7a6faaf17ff465045 |
10 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
eplanning.melawikab.go.id
103.134.19.183
362bcaa42090e36611031bec6bdaa0600375ef847092cca195c58d3bae9b4419
5162de2ee844a80d76b7d7514c02ab7d5de72a5966113323d80eb56bf6ded038
7b7e4adb65aa53b1bc731f15511c53d5beb73f187d5c5f35f19ebbfaf0decbbd
8603b20b548270423fb03c2138c16f5f863ead4c48eb0999167df869e2eef8a6
aea79d93a57e6ef0a5706d9b3f7861283310b3f8a3c30f538c7f699cd877233a
ce6a239fde88d8fb01c7a10d6f7b27d1bc23f5462d02f5ebb4927479fa32a302
d8748acb2eead2bb284ccec7029faaa404c1f2bda9cbeae2d777b9033e473a9d
d97797426d717621d5059e293ea468c8a463a3e8e7d89a5d90ac38eaa174ed64
da34bcf0063c1681753feea4808a01aa1706b32624b92e6b616eaff0a574ccf2