knitwear.com.np
Open in
urlscan Pro
198.1.112.132
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On June 30 via api from GB
Summary
This is the only time knitwear.com.np was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 198.1.112.132 198.1.112.132 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
3 | 151.101.12.193 151.101.12.193 | 54113 (FASTLY) (FASTLY - Fastly) | |
5 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: mx-01.intellisoftnepal.com
knitwear.com.np |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
imgur.com
i.imgur.com |
111 KB |
2 |
knitwear.com.np
knitwear.com.np |
2 KB |
5 | 2 |
Domain | Requested by | |
---|---|---|
3 | i.imgur.com |
knitwear.com.np
|
2 | knitwear.com.np |
knitwear.com.np
|
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
*.imgur.com DigiCert SHA2 Secure Server CA |
2018-12-14 - 2020-02-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://knitwear.com.np/proudfooot/
Frame ID: 42D3539CFB45B06B2176348C11238E78
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
knitwear.com.np/proudfooot/ |
561 B 867 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
knitwear.com.np/proudfooot/ |
677 B 983 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VpfM93Y.png
i.imgur.com/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
x0yYaq1.png
i.imgur.com/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xRk8fh8.png
i.imgur.com/ |
84 KB 84 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
i.imgur.com
knitwear.com.np
151.101.12.193
198.1.112.132
30df4de8f1573a19b93cb1d5146aedd60deff92d4b5b4be009534a5aafd5e3bf
60661b4f8441d744ea793455ae5baeeda34d5cabd8c1864f02de5a5f139f9ea4
9d98dea3aa3d3da6bac42e4815b2b71a9020a5755edc6544248818a19523f940
b91d54b76304476019764214ffd16221162e7f39fd1b3c25caf7947f8db79842
edb579d891ac318b3a542750f7fbcd1e65f2df528119d7d64f14f05a4d29c642