keralashotels.com
Open in
urlscan Pro
139.59.43.185
Malicious Activity!
Public Scan
Submission: On February 04 via api from CA
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on December 27th 2018. Valid for: 3 months.
This is the only time keralashotels.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Alaska USA Federal Credit Union (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 139.59.43.185 139.59.43.185 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
11 | 208.69.198.32 208.69.198.32 | 40226 (AKUSA) (AKUSA - Alaska USA Federal Credit Union) | |
1 | 208.69.197.135 208.69.197.135 | 40226 (AKUSA) (AKUSA - Alaska USA Federal Credit Union) | |
13 | 3 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
PTR: host.indias.com
keralashotels.com |
ASN40226 (AKUSA - Alaska USA Federal Credit Union, US)
login.alaskausa.org |
ASN40226 (AKUSA - Alaska USA Federal Credit Union, US)
www.alaskausa.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
alaskausa.org
login.alaskausa.org www.alaskausa.org |
47 KB |
1 |
keralashotels.com
keralashotels.com |
10 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
11 | login.alaskausa.org |
keralashotels.com
|
1 | www.alaskausa.org |
keralashotels.com
|
1 | keralashotels.com | |
13 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.alaskausa.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
keralashotels.com cPanel, Inc. Certification Authority |
2018-12-27 - 2019-03-27 |
3 months | crt.sh |
login.alaskausa.org DigiCert SHA2 Secure Server CA |
2018-09-25 - 2020-02-04 |
a year | crt.sh |
www.alaskausa.org DigiCert SHA2 Secure Server CA |
2018-12-11 - 2021-01-28 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://keralashotels.com/UserFiles/Image/iiiiiak//
Frame ID: 7F56119384BD10A414C0E98056EDF0A4
Requests: 13 HTTP requests in this frame
4 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Forgot User ID?
Search URL Search Domain Scan URL
Title: Other issues?
Search URL Search Domain Scan URL
Title: More contact information
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
keralashotels.com/UserFiles/Image/iiiiiak// |
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ub-main.css
login.alaskausa.org/efs/efs/jsp/inc/css/ |
20 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ub-login-new.css
login.alaskausa.org/efs/efs/jsp/inc/css/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common_functions.js
login.alaskausa.org/efs/efs/jslibrary/ |
8 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
open_window.js
login.alaskausa.org/efs/efs/jslibrary/ |
5 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
akusafcu_logo.png
login.alaskausa.org/efs/efs/grafx/akusa/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-ehl-tri.gif
login.alaskausa.org/efs/efs/grafx/akusa/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-ncua.gif
login.alaskausa.org/efs/efs/grafx/akusa/ |
4 KB 5 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ub-print.css
login.alaskausa.org/efs/efs/jsp/inc/css/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ub-popup.css
login.alaskausa.org/efs/efs/jsp/inc/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header_bg.png
login.alaskausa.org/efs/efs/grafx/akusa/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pgMainEdge.png
www.alaskausa.org/css/nav/ |
960 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bullet-right.png
login.alaskausa.org/efs/images/ |
154 B 470 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Alaska USA Federal Credit Union (Banking)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| isBlank function| isValidMask function| trimSpaces function| isNum function| hasInvalidChar function| isInvalidChar function| hasInvalidCharBeneficiary function| isInvalidCharBeneficiary function| isChar function| isNumOrChar function| stripChars function| isLength function| parseString function| isAllNums function| stripSpaces function| containsInvalidChar function| isItInvalidChar function| showNote function| toggleTree function| toggleNote function| PopupWindow function| PopupHelp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
keralashotels.com
login.alaskausa.org
www.alaskausa.org
139.59.43.185
208.69.197.135
208.69.198.32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