phishing.cfd
Open in
urlscan Pro
2a06:98c1:3121::3
Malicious Activity!
Public Scan
Submission Tags: tweet @phishinghunter_ #dhl #phishing #alert #scam #scampage Search All
Submission: On April 09 via api from FI — Scanned from NL
Summary
This is the only time phishing.cfd was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:1734 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3030::6815:ba0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 85.187.128.43 85.187.128.43 | 55293 (A2HOSTING) (A2HOSTING) | |
2 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3038::6815:ea91 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2606:4700:e4:... 2606:4700:e4::ac40:a916 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 65.9.95.121 65.9.95.121 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 54.216.77.17 54.216.77.17 | 16509 (AMAZON-02) (AMAZON-02) | |
31 | 10 |
ASN55293 (A2HOSTING, US)
PTR: sg1-sr9.supercp.com
mail.deliverylifesupport.com |
ASN16509 (AMAZON-02, US)
PTR: server-65-9-95-121.prg50.r.cloudfront.net
static.hotjar.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-216-77-17.eu-west-1.compute.amazonaws.com
csmetrics.hotjar.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1666 ka-f.fontawesome.com — Cisco Umbrella Rank: 3207 |
288 KB |
4 |
phishing.cfd
phishing.cfd |
16 KB |
3 |
deliverylifesupport.com
mail.deliverylifesupport.com |
271 KB |
2 |
hotjar.com
static.hotjar.com — Cisco Umbrella Rank: 677 csmetrics.hotjar.com — Cisco Umbrella Rank: 17119 |
4 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
82 KB |
1 |
lr-in.com
cdn.lr-in.com — Cisco Umbrella Rank: 19471 r.lr-in.com Failed |
163 KB |
1 |
killbot.org
files.killbot.org |
|
0 |
Failed
function sub() { [native code] }. Failed |
|
31 | 8 |
Domain | Requested by | |
---|---|---|
6 | ka-f.fontawesome.com |
kit.fontawesome.com
phishing.cfd |
4 | phishing.cfd |
phishing.cfd
|
3 | mail.deliverylifesupport.com |
phishing.cfd
mail.deliverylifesupport.com |
2 | cdnjs.cloudflare.com |
phishing.cfd
cdnjs.cloudflare.com |
1 | csmetrics.hotjar.com |
static.hotjar.com
|
1 | static.hotjar.com |
phishing.cfd
|
1 | cdn.lr-in.com |
phishing.cfd
|
1 | files.killbot.org |
phishing.cfd
|
1 | kit.fontawesome.com |
phishing.cfd
|
0 | r.lr-in.com Failed |
cdn.lr-in.com
|
0 | eofcbnmajmjmplflapaojjnihcjkigck Failed |
phishing.cfd
|
31 | 11 |
This site contains links to these domains. Also see Links.
Domain |
---|
altadefinizione.haus |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-11-22 - 2023-12-23 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-29 - 2023-06-28 |
a year | crt.sh |
*.hotjar.com Amazon ECDSA 256 M01 |
2023-03-09 - 2024-04-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://phishing.cfd/
Frame ID: 94A384E4AAE529DE40F11398F085AFA1
Requests: 31 HTTP requests in this frame
Screenshot
Page Title
DHLDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Hotjar (Analytics) Expand
Detected patterns
- //static\.hotjar\.com/
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Altadefinizione
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
31 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
phishing.cfd/ |
54 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f7165dd215.js
kit.fontawesome.com/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
killbot-security.js
files.killbot.org/.cdn-cgi/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
mail.deliverylifesupport.com/public/css/ |
429 KB 57 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logger-1.min.js
cdn.lr-in.com/ |
819 KB 163 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fonts.css
eofcbnmajmjmplflapaojjnihcjkigck/common/ui/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
phishing.cfd/images/ |
555 B 555 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.png
phishing.cfd/images/ |
555 B 555 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
foo.png
phishing.cfd/images/ |
555 B 555 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
mail.deliverylifesupport.com/public/js/ |
2 MB 204 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
session-recorder.js
mail.deliverylifesupport.com/public/js/ |
44 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v6.4.0/css/ |
100 KB 23 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v6.4.0/css/ |
27 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v5-font-face.min.css
ka-f.fontawesome.com/releases/v6.4.0/css/ |
823 B 719 B |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-font-face.min.css
ka-f.fontawesome.com/releases/v6.4.0/css/ |
2 KB 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hotjar-2895475.js
static.hotjar.com/c/ |
9 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
roboto-latin-400-normal.woff2
mail.deliverylifesupport.com/fonts/vendor/@fontsource/roboto/files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webfa-brands-400.woff2
mail.deliverylifesupport.com/public/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webfa-solid-900.woff2
mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
roboto-all-400-normal.woff
mail.deliverylifesupport.com/fonts/vendor/@fontsource/roboto/files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webfa-solid-900.woff
mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webfa-brands-400.woff
mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webfa-solid-900.ttf
mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webfa-brands-400.ttf
mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
ad91ed1a-1657-4c84-9f29-8f108c2f8a8a
http://phishing.cfd/ |
455 KB 0 |
Other
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-fa-solid-900.woff2
ka-f.fontawesome.com/releases/v6.4.0/webfonts/ |
147 KB 147 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-fa-brands-400.woff2
ka-f.fontawesome.com/releases/v6.4.0/webfonts/ |
105 KB 106 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
csmetrics.hotjar.com/ |
0 70 B |
Ping
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
i
r.lr-in.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- eofcbnmajmjmplflapaojjnihcjkigck
- URL
- chrome-extension://eofcbnmajmjmplflapaojjnihcjkigck/common/ui/fonts/fonts.css
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fontsource/roboto/files/roboto-latin-400-normal.woff2?4673b4537a84c7f7a130799aa6af329b
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/public/css/fonts/webfa-brands-400.woff2?d878b0a6a1144760244ff0665888404c
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/webfa-solid-900.woff2?1551f4f60c37af51121f106501f69b80
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fontsource/roboto/files/roboto-all-400-normal.woff?376ea5d93f71583052f65de4e0c6a92c
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/webfa-solid-900.woff?eeccf4f66002c6f2ba24d3d22f2434c2
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/webfa-brands-400.woff?2285773e6b4b172f07d9b777c81b0775
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/webfa-solid-900.ttf?be9ee23c0c6390141475d519c2c5fb8f
- Domain
- mail.deliverylifesupport.com
- URL
- http://mail.deliverylifesupport.com/fonts/vendor/@fortawesome/fontawesome-free/webfa-brands-400.ttf?527940b104eb2ea366c8630f3f038603
- Domain
- r.lr-in.com
- URL
- https://r.lr-in.com/i?a=mnnzup%2Fdus&r=5-ebd9a0e9-2062-448b-aba8-8031e908c6c3&t=240ff6ef-ec05-4640-979f-dbea6b791df8&s=0&rs=0%2Cu&u=a8e5ed43-045d-4709-b9aa-457d987db496&is=1
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)37 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| FontAwesomeKitConfig function| redirect string| sessionHash function| hj object| _hjSettings object| regeneratorRuntime object| __SDKCONFIG__ function| _LRLogger object| hjSiteSettings function| hjBootstrap object| hjLazyModules object| webpackChunk function| jQuery function| $ object| ParsleyExtend object| ParsleyConfig object| psly object| Parsley object| ParsleyUtils object| ParsleyValidator object| ParsleyUI string| inputEventPatched object| intlTelInputUtils function| openNav function| closeNav function| _lrMutationObserver function| _lrXMLHttpRequest boolean| _lr_loaded boolean| errorInB boolean| errorInC object| authTimeout boolean| hasBLogin boolean| isInBLogin object| bLogin function| Pusher object| Echo3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
phishing.cfd/ | Name: _lr_tabs_-mnnzup%2Fdus Value: {%22sessionID%22:0%2C%22recordingID%22:%225-ebd9a0e9-2062-448b-aba8-8031e908c6c3%22%2C%22lastActivity%22:1681060649674} |
|
phishing.cfd/ | Name: _lr_hb_-mnnzup%2Fdus Value: {%22heartbeat%22:1681060649674} |
|
phishing.cfd/ | Name: _lr_uf_-mnnzup Value: 6493e1cf-64dc-46b5-859b-b125988bd805 |
21 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.lr-in.com
cdnjs.cloudflare.com
csmetrics.hotjar.com
eofcbnmajmjmplflapaojjnihcjkigck
files.killbot.org
ka-f.fontawesome.com
kit.fontawesome.com
mail.deliverylifesupport.com
phishing.cfd
r.lr-in.com
static.hotjar.com
eofcbnmajmjmplflapaojjnihcjkigck
mail.deliverylifesupport.com
r.lr-in.com
2606:4700:3030::6815:ba0
2606:4700:3038::6815:ea91
2606:4700::6811:190e
2606:4700::6812:1734
2606:4700:e4::ac40:a916
2a06:98c1:3121::3
54.216.77.17
65.9.95.121
85.187.128.43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