www.dofps.gov.bt
Open in
urlscan Pro
202.144.157.181
Malicious Activity!
Public Scan
Submission: On April 09 via api from RU
Summary
This is the only time www.dofps.gov.bt was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 202.144.157.181 202.144.157.181 | 18024 (BTTELECOM...) (BTTELECOM-AS-AP Bhutan Telecom Ltd) | |
10 | 1 |
ASN18024 (BTTELECOM-AS-AP Bhutan Telecom Ltd, BT)
PTR: mail2.moa.gov.bt
www.dofps.gov.bt |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
dofps.gov.bt
1 redirects
www.dofps.gov.bt |
263 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
11 | www.dofps.gov.bt |
1 redirects
www.dofps.gov.bt
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/
Frame ID: 45259CF9DF7252A10D2E430E06216FD5
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49
HTTP 301
http://www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/ Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
CentOS (Operating Systems) Expand
Detected patterns
- headers server /CentOS/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49
HTTP 301
http://www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon.ico
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
17 KB 17 KB |
Stylesheet
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/js/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background-medium.jpg
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
215 KB 216 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
check.png
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
577 B 901 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fb.png
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
globe.png
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
down.png
www.dofps.gov.bt/wp-admin/images/ser/2020/EN/d550216af6333c3ef7ccded988557b49/assets/img/ |
634 B 959 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated boolean| error_username boolean| error_password function| validateEmail function| validatePhoneNumber1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.dofps.gov.bt/ | Name: PHPSESSID Value: kea8pmrfoecdi0p2olhfnlhpp6 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.dofps.gov.bt
202.144.157.181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