usps.uspsox.com
Open in
urlscan Pro
43.135.143.230
Malicious Activity!
Public Scan
Submission: On December 16 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on November 9th 2023. Valid for: 3 months.
This is the only time usps.uspsox.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Cash App (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 43.135.143.230 43.135.143.230 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
13 | 1 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
usps.uspsox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
uspsox.com
usps.uspsox.com |
1 MB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | usps.uspsox.com |
usps.uspsox.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
w3.dddadmin.top R3 |
2023-11-09 - 2024-02-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://usps.uspsox.com/admin/
Frame ID: E2FE709C8AE144CA5481598556AA89E0
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
usps.uspsox.com/admin/ |
5 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.c43af097.css
usps.uspsox.com/admin/static/css/ |
151 KB 63 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-elementUI.68c70ad5.css
usps.uspsox.com/admin/static/css/ |
228 KB 43 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-libs.3dfb7769.css
usps.uspsox.com/admin/static/css/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.4317e5b5.js
usps.uspsox.com/admin/static/js/ |
83 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-elementUI.56991a65.js
usps.uspsox.com/admin/static/js/ |
654 KB 189 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-libs.4ed9d2e9.js
usps.uspsox.com/admin/static/js/ |
426 KB 164 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-74195e6e.745aac88.css
usps.uspsox.com/admin/static/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-74195e6e.35424071.js
usps.uspsox.com/admin/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg3.f3cfc40a.jpg
usps.uspsox.com/admin/static/img/ |
535 KB 536 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CashMarket-RegularRounded.6d90b43b.woff2
usps.uspsox.com/admin/static/fonts/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CashMarket-MediumRounded.78f6a728.woff2
usps.uspsox.com/admin/static/fonts/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CashMarket-BoldRounded.4c453c36.woff2
usps.uspsox.com/admin/static/fonts/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Cash App (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| webpackJsonp object| __SVG_SPRITE__ function| _XMLHttpRequest undefined| _ActiveXObject function| changeImg0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
usps.uspsox.com
43.135.143.230
0bde1438a446131d3bd119b5e0128788a4cbe3e0528ed4de899af9a860008f7f
32ce0116ec544d7c3a3f10163fabb110f4c8e49be67489b60957badd5acc8bc3
525d2b1c5feb8dfb8bb50e3fb6e90a0ab7c23d5aa9cba0b64862f262227a3e85
604f76c3af5d21bc5a8d9dc8c9471527001459203b0e60b448f2942ca0f034c8
6ff4bda0ccc8ac7d9020e54c9068b65c6e232c9612cba98dbfd97def36f204cf
920d6493f835f5a9a4ca023f079fa556b378c70f7446d14c652cf9affab3346f
b33eb5b49a8bac1cb198391a0950b30127bceb2e50f3aaf6ecf0394c84143221
c39ce6588e47fada35009d402aea20c51de165853396948101d1e77096224fe9
c3fd5a1d9cee8d2d4097ebc74b60a21fa25b8619ce5ef919638b7487162a5617
de531e5c7be5d41643ca0ca0eda3794751eb52275c95a774da8df60ef8729b3b
e2db87a2f8ac0fe6cd7b0747ca8cbc7d43272481ac5d9253e7a877a9b5b99b20
e9385bdbd9771041904d8662b0b8f899e079077dbd0645d77212f14507f3eb73
f1441f3de644415f0c869eb1dc093b7a91549e59d19cd93ba09af9b9eee4a3c0