3-134-100-10.cprapid.com
Open in
urlscan Pro
3.134.100.10
Malicious Activity!
Public Scan
Effective URL: https://3-134-100-10.cprapid.com/CVDoffices/confirm-appointment.php?action=confirm-booking&inviteID=YUHFXJUWSdULvaVtrVtZKgQFDEXBI...
Submission: On August 15 via manual from IN
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 7th 2021. Valid for: a year.
This is the only time 3-134-100-10.cprapid.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: NHS UK (Healthcare)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 209.105.227.16 209.105.227.16 | 13354 (ZC38-AS1) (ZC38-AS1) | |
1 6 | 3.134.100.10 3.134.100.10 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700:20:... 2606:4700:20::681a:407 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 67.202.94.94 67.202.94.94 | 32748 (STEADFAST) (STEADFAST) | |
8 | 5 |
ASN13354 (ZC38-AS1, US)
PTR: mail.sriaurosaltlake.in
sriaurosaltlake.in |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-134-100-10.us-east-2.compute.amazonaws.com
3-134-100-10.cprapid.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cprapid.com
1 redirects
3-134-100-10.cprapid.com |
188 KB |
2 |
sriaurosaltlake.in
1 redirects
sriaurosaltlake.in |
612 B |
1 |
amung.us
whos.amung.us |
145 B |
1 |
waust.at
waust.at |
7 KB |
8 | 4 |
Domain | Requested by | |
---|---|---|
6 | 3-134-100-10.cprapid.com |
1 redirects
3-134-100-10.cprapid.com
|
2 | sriaurosaltlake.in | 1 redirects |
1 | whos.amung.us |
waust.at
|
1 | waust.at |
3-134-100-10.cprapid.com
|
8 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
whos.amung.us |
Subject Issuer | Validity | Valid | |
---|---|---|---|
3-134-100-10.cprapid.com cPanel, Inc. Certification Authority |
2021-08-07 - 2022-08-07 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-08-04 - 2022-08-03 |
a year | crt.sh |
whos.amung.us Sectigo RSA Domain Validation Secure Server CA |
2020-05-21 - 2022-05-21 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://3-134-100-10.cprapid.com/CVDoffices/confirm-appointment.php?action=confirm-booking&inviteID=YUHFXJUWSdULvaVtrVtZKgQFDEXBIstdEmovewEEIEuqIjtOomBAvZOYdO
Frame ID: 3E03768ECBFB8805A0904BCA7603DF8A
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://sriaurosaltlake.in/CVD02
HTTP 301
http://sriaurosaltlake.in/CVD02/ Page URL
-
https://3-134-100-10.cprapid.com/CVDoffices
HTTP 301
https://3-134-100-10.cprapid.com/CVDoffices/ Page URL
- https://3-134-100-10.cprapid.com/CVDoffices/confirm-appointment.php?action=confirm-booking&inviteID=YUHFXJUWS... Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: 16
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://sriaurosaltlake.in/CVD02
HTTP 301
http://sriaurosaltlake.in/CVD02/ Page URL
-
https://3-134-100-10.cprapid.com/CVDoffices
HTTP 301
https://3-134-100-10.cprapid.com/CVDoffices/ Page URL
- https://3-134-100-10.cprapid.com/CVDoffices/confirm-appointment.php?action=confirm-booking&inviteID=YUHFXJUWSdULvaVtrVtZKgQFDEXBIstdEmovewEEIEuqIjtOomBAvZOYdO Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://sriaurosaltlake.in/CVD02 HTTP 301
- http://sriaurosaltlake.in/CVD02/
- https://3-134-100-10.cprapid.com/CVDoffices HTTP 301
- https://3-134-100-10.cprapid.com/CVDoffices/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
sriaurosaltlake.in/CVD02/ Redirect Chain
|
88 B 376 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
/
3-134-100-10.cprapid.com/CVDoffices/ Redirect Chain
|
228 B 608 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
confirm-appointment.php
3-134-100-10.cprapid.com/CVDoffices/ |
21 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sample.css
3-134-100-10.cprapid.com/CVDoffices/section/ |
131 KB 132 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d.js
waust.at/ |
13 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FrutigerLTW01-55Roman.woff2
3-134-100-10.cprapid.com/CVDoffices/section/ |
17 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FrutigerLTW01-65Bold.woff2
3-134-100-10.cprapid.com/CVDoffices/section/ |
17 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
29 B 145 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: NHS UK (Healthcare)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| irmNaf function| RqkKwrzPGpx function| msJjaCuJF2 function| mMxjePcQq3 function| ScPIizfRD4 object| _wau string| wau_w_col string| wau_w_siz object| WAU_ren function| WAU_dynamic function| WAU_dynamic_request function| WAU_r_d function| WAU_insert function| WAU_la function| WAU_addCommas function| WAU_lrd function| WAU_lrs function| WAU_cps function| docReady object| x string| x1 string| x21 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
3-134-100-10.cprapid.com/ | Name: PHPSESSID Value: b5ce89ef2f47d30048db85f4a6890f23 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
3-134-100-10.cprapid.com
sriaurosaltlake.in
waust.at
whos.amung.us
209.105.227.16
2606:4700:20::681a:407
3.134.100.10
67.202.94.94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