jgyft5r.web.app
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Submission: On October 10 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by GTS CA 1D4 on September 11th 2023. Valid for: 3 months.
This is the only time jgyft5r.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: State Bank of India (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
20 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700:303... 2606:4700:3033::6815:420f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
21 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
web.app
jgyft5r.web.app |
302 KB |
1 |
niyawz.online
dns.niyawz.online |
564 B |
21 | 2 |
Domain | Requested by | |
---|---|---|
20 | jgyft5r.web.app |
jgyft5r.web.app
|
1 | dns.niyawz.online |
jgyft5r.web.app
|
21 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
web.app GTS CA 1D4 |
2023-09-11 - 2023-12-10 |
3 months | crt.sh |
niyawz.online E1 |
2023-09-20 - 2023-12-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jgyft5r.web.app/
Frame ID: 3BC2AE467EC274568BA4F6514FDEADAD
Requests: 21 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jgyft5r.web.app/ |
2 KB 972 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d0dfcb0560db59a8.css
jgyft5r.web.app/_next/static/css/ |
226 B 237 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d0b995f00f428fc2.css
jgyft5r.web.app/_next/static/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webpack-2555a4296ab7a1b2.js
jgyft5r.web.app/_next/static/chunks/ |
2 KB 895 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
framework-0c7baedefba6b077.js
jgyft5r.web.app/_next/static/chunks/ |
138 KB 39 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-2f8a559bf41c5649.js
jgyft5r.web.app/_next/static/chunks/ |
112 KB 28 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_app-83735b03f48df9ad.js
jgyft5r.web.app/_next/static/chunks/pages/ |
520 B 395 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
345-06903d3df5375bbe.js
jgyft5r.web.app/_next/static/chunks/ |
10 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-8af2e18ab9795a1d.js
jgyft5r.web.app/_next/static/chunks/pages/ |
18 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_buildManifest.js
jgyft5r.web.app/_next/static/LPw06nI0pvjEmY89UK_VK/ |
1 KB 665 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_ssgManifest.js
jgyft5r.web.app/_next/static/LPw06nI0pvjEmY89UK_VK/ |
77 B 176 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
vrtppwlsxp.gif
jgyft5r.web.app/ |
105 KB 90 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
354-4e020a05081b574c.js
jgyft5r.web.app/_next/static/chunks/ |
52 KB 15 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
nymvwklfxw-9ce49d8986ef419e.js
jgyft5r.web.app/_next/static/chunks/pages/ |
15 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
d0b995f00f428fc2.css
jgyft5r.web.app/_next/static/css/ |
7 KB 2 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
tmjlogazlt.json
jgyft5r.web.app/ |
3 KB 1 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
csrf
dns.niyawz.online/ |
18 B 564 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
vrtppwlsxp.gif
jgyft5r.web.app/ |
105 KB 90 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
lbgpietmnu.png
jgyft5r.web.app/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
vulxshxmam.png
jgyft5r.web.app/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
nlgijidvwj.png
jgyft5r.web.app/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: State Bank of India (Banking)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunk_N_E function| __next_require__ function| __next_set_public_path__ object| next object| __NEXT_DATA__ function| __SSG_MANIFEST_CB object| __NEXT_P object| _N_E object| __MIDDLEWARE_MATCHERS object| __BUILD_MANIFEST object| __SSG_MANIFEST0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dns.niyawz.online
jgyft5r.web.app
2606:4700:3033::6815:420f
2620:0:890::100
18d88c6fb86e31d9715e71ff60570abfb768363d7670cb84737a0474d2f5913a
1b3688fb6ea6ab464f23bae1057b00bc388b5b5970a87aa7f5742f23631141d1
1cd1cca3aebcdd10c33d713a95479909354ddbc5d5ad9761466ac27ea528895d
22919e6aeb9a6659e6c79611915e32536476da58d45745bcb08f5b436693ae9f
2476e843c4eb26f0434fbe2f9627b1d028c96201a9e7d171489cb2b3e4283d44
32e4b7e76d04571cad1b49afeb0f19e7a7b2948d7b15a95c90534fe97d42bd65
4001c31e7a271b9c5ecbcd6c44fdf85c15f9380835ddd88f7b8fcc4f3f71f393
49ece970f9a579df5d562511bd3636f8bb3e36554998466ce1cd16a4b2bc7c9b
5454926a5d98a6e62558621d6832be6c10e5a61519f014cd5f73c2c52b5c2ce5
69a63c47f61edeff7561553a7ead0adf7c2769c64edb8dca44278c9f0eec4e57
6f5b4aa00d2f8d6aed9935b471806bf7acef464d0c1d390260e5fe27f800c67e
8548f0e5d0ad9f008612807170927d4e3126c46496c184c05f0fb1ce4b728003
90e22bda5ac09781c6a0641a0e37842219e5875c00a9766fd3c64acba61e5d10
a0fbb2f835713a0319bc2e5b516fc9005ab3856dcb374244adbfaeb9bee345e1
cf669fb2b760a389b00c421e75ea8347ecc715af19bd09babbf30272c7722415
d475792eb994ab10747563a804164114f676511cda598b21343da540e3d1e826
d4b2102918440b431e5ac116b43cb29fc2da5fbe6e427ea4cd03e624d4e54347
db9a9b9fb0b267813e3b439dea35f31bc0cc472d1d2ad6b579ab9ffd1d77103a
fb4b2ca45080cdc634eeaa2df1f4bd4f5997d871a6433b7726854afa275a4e0a