postoffice.mypackageattempt.info
Open in
urlscan Pro
111.90.151.129
Malicious Activity!
Public Scan
Submission: On June 06 via manual from GB — Scanned from GB
Summary
TLS certificate: Issued by R3 on June 6th 2022. Valid for: 3 months.
This is the only time postoffice.mypackageattempt.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Post Office UK (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
35 | 111.90.151.129 111.90.151.129 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
35 | 1 |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
PTR: server1.kamon.la
postoffice.mypackageattempt.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
35 |
mypackageattempt.info
postoffice.mypackageattempt.info |
513 KB |
35 | 1 |
Domain | Requested by | |
---|---|---|
35 | postoffice.mypackageattempt.info |
postoffice.mypackageattempt.info
|
35 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
postoffice.mypackageattempt.info R3 |
2022-06-06 - 2022-09-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://postoffice.mypackageattempt.info/
Frame ID: 8CA35F27AFA9434B699B0BA21CD6457E
Requests: 35 HTTP requests in this frame
Screenshot
Page Title
Redelivery | PostOfficeDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
35 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
postoffice.mypackageattempt.info/ |
257 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bfinder.css
postoffice.mypackageattempt.info/public/css/ |
19 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.css
postoffice.mypackageattempt.info/public/css/ |
33 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
postoffice.mypackageattempt.info/public/css/ |
127 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
postoffice.mypackageattempt.info/public/css/ |
2 MB 152 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
init-min.js
postoffice.mypackageattempt.info/.resources/pol-module-rebrand/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nav.css
postoffice.mypackageattempt.info/public/css/ |
65 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
postoffice.mypackageattempt.info/public/images/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sep.css
postoffice.mypackageattempt.info/public/css/ |
120 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bf-rest.css
postoffice.mypackageattempt.info/public/css/ |
52 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
HeaderMarker.png
postoffice.mypackageattempt.info/.resources/pol-module-main/img/branch-finder/ |
259 B 259 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
drop_go.jpg
postoffice.mypackageattempt.info/public/images/ |
21 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gift.jpg
postoffice.mypackageattempt.info/public/images/ |
10 KB 10 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prize.jpg
postoffice.mypackageattempt.info/public/images/ |
18 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
image002.png
postoffice.mypackageattempt.info/dam/jcr:5f8e2b7a-92bf-4819-b930-30cb0db5f83c/ |
255 B 255 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-new-page.png
postoffice.mypackageattempt.info/.resources/pol-module-main/img/ |
246 B 246 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fb.png
postoffice.mypackageattempt.info/public/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
twit.png
postoffice.mypackageattempt.info/public/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yt.png
postoffice.mypackageattempt.info/public/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site-search.js
postoffice.mypackageattempt.info/.resources/pol-module-rebrand/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safe.png
postoffice.mypackageattempt.info/public/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2C46D7_2_0.woff
postoffice.mypackageattempt.info/public/font/ProbaPro/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search.png
postoffice.mypackageattempt.info/public/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t-n.png
postoffice.mypackageattempt.info/public/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
h-s.png
postoffice.mypackageattempt.info/public/images/ |
888 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
down-arrow.png
postoffice.mypackageattempt.info/img/navigation/ |
227 B 227 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c2.png
postoffice.mypackageattempt.info/public/images/ |
838 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b1.png
postoffice.mypackageattempt.info/public/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b1.png
postoffice.mypackageattempt.info/public/img/icn/d_2/f_4/z_24/d_2/ |
236 B 236 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
headerfootersprite.png
postoffice.mypackageattempt.info/public/images/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2C46D7_0_0.woff
postoffice.mypackageattempt.info/public/font/ProbaPro/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2C46D7_2_0.ttf
postoffice.mypackageattempt.info/public/font/ProbaPro/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2C46D7_0_0.ttf
postoffice.mypackageattempt.info/public/font/ProbaPro/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2C46D7_2_0.woff
postoffice.mypackageattempt.info/public/fonts/ |
83 KB 83 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2C46D7_0_0.woff
postoffice.mypackageattempt.info/public/fonts/ |
78 KB 78 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Post Office UK (Government)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
postoffice.mypackageattempt.info/ | Name: PHPSESSID Value: kbvj9cpfo5b60h88qsgg2aahu7 |
11 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
postoffice.mypackageattempt.info
111.90.151.129
032d2c4a563898715ddaf2d7587b49988b36954c45b9d816b07092079224e27c
126fdcd7b7201b069cf9dfeb44653173e76bb600d83b3e0aae52832729b4dca9
238127fc58e3a1515c850eb008b278996d3ada62ac8907f5dcebfee2ab9e44a5
2d337e56d4d9eeea6866d55d16b44960732c00f3b89c5993ff3701482fda234a
328f632d8d1b239e18f4972343b594a03ece346d0c18513feb6afd4035725e23
34220d1e86514832c6c3643cf606e78d178dfef61d9c5b39d5e7a87a16fab0f6
3c63a199f3c7a30af0a97ca799c3969d2933cf5f14ad3c7ef57ffcd79c50d957
495faa61c26ec420852ce8e87ed4af7add8957eaa123ff6b7c5d4977265c9b6d
4d9b4fabfd8a4de1264983d83a284a8df582b2db5eee4855fa5036f8710d9a8b
4e06d061295869532156582eb8a4ae965f944c430e0b312e5eff2ce35cf7cbe3
4ecb2a80b2d28cd183699ea623614dcc43da75ce68a26602835418db693cd4b2
567a52f6e0f6217e24521c381f0160d3530119f34749dfe722365d8ba71c69af
673a7e0bc39057fe881fcea8be4bab440f22d016de6c75d502d849b8cc58bb3f
79bcd905aacd69f020a0ecfe831d0f8f7c16d174b2b2847cc3f613c6f454f5ac
925f7c91a03895f82d90c687fe08621ab36397025e9aa290eae74b37e163b8c4
92d001c59af93e70cefde9d03c0b7a97662a09287d27677014988042f2506e6c
92e6bceca8c717863221153f2b9d305553d39b1b8d1242f499e93ce0be90ab42
a0c154e4cb595d229a79914bfbc2fb440007202418d9f5a69478eebb6a533d1c
b010abeeeec88f0a9f22b75e91fd3bb86cc8e55e27355bfbdfc73c04be7b8189
bb535072e71d7b7bccae46f65621db0473ec002f44eae86ff89db1eebc6a657c
c2d6bbdaf23a4b91185aa42a748a5a91cb7349038a2f1d98f29f10e6aa28a984
c5f5fb53033d709836dfa1dd7c84d756bd70274a93189b417e05e13bfadc0417
ce932c0d6e8ca3a0026ed514cd3c15f840741eebefe3fe830ed020aa0ff4aa37
d9a37207f3f50836e6899218e269fe2bac544509e479c13c6a4c33bdf061b084
e72bbaaa0dc4225ce262c1186a0ca15d9d27197653b748935a633c219923a439
ef7c89e4fa649288ade0639e5fdac1b076cf1ff971406a9474fc5abc6dcb01f8
f3effa3c574a4845837f9c21adff8f802118f1672a5537ec27b24ee08030bb18
fd37639ad28e1966b2e75a40b9a119d70c8d20f6d64931c8f5c4ed37f46d1e7f
fe029a4df498862ba1ba40901d4a0767a9d1109c4cb3f9f386bf6ef2dbe5e326