sgx11.dewaweb.com
Open in
urlscan Pro
103.145.227.133
Malicious Activity!
Public Scan
Effective URL: https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/login.php
Submission: On September 20 via api from US — Scanned from CH
Summary
TLS certificate: Issued by R11 on July 24th 2024. Valid for: 3 months.
This is the only time sgx11.dewaweb.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 13 | 103.145.227.133 103.145.227.133 | 139456 (IDNIC-NSR...) (IDNIC-NSR-DEWAWEB-AS-ID PT DEWAWEB) | |
1 | 199.59.243.226 199.59.243.226 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:86c0:209... 2a00:86c0:2091::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
13 | 3 |
ASN139456 (IDNIC-NSR-DEWAWEB-AS-ID PT DEWAWEB, ID)
PTR: sgx11.dewaweb.com
sgx11.dewaweb.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
dewaweb.com
2 redirects
sgx11.dewaweb.com |
216 KB |
1 |
nflxext.com
assets.nflxext.com — Cisco Umbrella Rank: 4617 |
72 KB |
1 |
js-codes.com
js-codes.com |
34 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
13 | sgx11.dewaweb.com |
2 redirects
sgx11.dewaweb.com
|
1 | assets.nflxext.com |
sgx11.dewaweb.com
|
1 | js-codes.com |
sgx11.dewaweb.com
|
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sgx11.dewaweb.com R11 |
2024-07-24 - 2024-10-22 |
3 months | crt.sh |
js-codes.com R10 |
2024-08-30 - 2024-11-28 |
3 months | crt.sh |
*.1.nflxso.net WR1 |
2024-09-10 - 2024-10-12 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/login.php
Frame ID: 8A0420A59266E55426D5C4D42CFE504B
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
My AccountPage URL History Show full URLs
-
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/login.php
HTTP 302
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/index.php HTTP 302
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/login.php Page URL
Detected technologies
Modernizr (JavaScript Libraries) ExpandDetected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/login.php
HTTP 302
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/index.php HTTP 302
https://sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
login.php
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/ Redirect Chain
|
1001 B 872 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
none.css
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/style/ |
119 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
none2.css
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/style/ |
134 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modernizr.min.js
js-codes.com/modernizr/2.8.7/ |
34 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.js
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/js/ |
85 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.ccvalid.js
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/js/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.mask.js
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/js/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
step3.php
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/workshop/stockers/ |
5 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/pic/ |
17 KB 17 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bg.jpg
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/pic/ |
117 KB 117 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.svg
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/pic/ |
864 B 573 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fb.png
sgx11.dewaweb.com/~omsyarif/public/otp/lazy/update/app/pic/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-93.woff
assets.nflxext.com/ffe/siteui/fonts/ |
72 KB 72 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| version object| __parkour function| $ function| jQuery object| $jscomp function| isEmail1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sgx11.dewaweb.com/ | Name: PHPSESSID Value: 70237qftbmfg22gf0fpsv0126b |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15552000;includeSubDomains; preload |
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
js-codes.com
sgx11.dewaweb.com
103.145.227.133
199.59.243.226
2a00:86c0:2091::1
38c89b667f0b98ab618ce6eef2947a58b9cac93e4dce667fec781562c34cd66e
3e49d9dc43267590184389ab3da0cb9f7308c9c848667dab109a0f7c73450ece
3ead6fe989dca45aca11771366092f9f7bab0300dfd874318ce745bc53d9ab53
48716bbe357465a241d182a335c8a8210c3d987050df3e4494dddf88db6ab305
5cfce24261211668d5db5a01c4fcdae60852d01faa05b325ee63410280c7221d
8603b20b548270423fb03c2138c16f5f863ead4c48eb0999167df869e2eef8a6
8a421d5798accee1c284865ac05cee792ad3f6bcb3c70ce1dcb954d23e86fdad
98713b53a74ebe7e326353080c5f1653e83af61d6363c0b3c4c67d6d24197b4d
abe8012eb65c0dc0ac3e87dcc1e60e1908ebd8f12b7c47a5df1856f7a7bb1edd
ca83477931d09aca84c55e779bb2e6ef502b1af1bef668de771b8209a43eb11b
cde4074549e72df2b148594b13728b01118887d02d99e5e7d67c5d1e54cc6669
d05dc1371e4e40d368caca0251b3e701b09ee414abdd5ed577c80cb10244bfcd
ebed425ce97fd847ea4a8b5c00c79a3be333247972a72755dd26af0bf7250152