puritneistnaso.cloud
Open in
urlscan Pro
86.38.202.21
Malicious Activity!
Public Scan
Submission: On April 12 via manual — Scanned from AU
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on March 28th 2023. Valid for: 3 months.
This is the only time puritneistnaso.cloud was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 86.38.202.21 86.38.202.21 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
2 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.16.86.20 104.16.86.20 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
puritneistnaso.cloud
puritneistnaso.cloud |
42 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2561 |
39 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 374 |
8 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
4 | puritneistnaso.cloud |
puritneistnaso.cloud
|
2 | stackpath.bootstrapcdn.com |
puritneistnaso.cloud
|
1 | cdn.jsdelivr.net |
puritneistnaso.cloud
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
puritneistnaso.cloud ZeroSSL RSA Domain Secure Site CA |
2023-03-28 - 2023-06-26 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://puritneistnaso.cloud/poow/mygov/ato/
Frame ID: 470E6199BEC619DF20A7422C3C4BE506
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
myGovDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
puritneistnaso.cloud/poow/mygov/ato/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bood.css
puritneistnaso.cloud/poow/mygov/ato/ |
201 B 307 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/5.0.0-alpha1/css/ |
142 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/ |
21 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/5.0.0-alpha1/js/ |
62 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myGov-cobranded-logo-black.svg
puritneistnaso.cloud/poow/mygov/ato/img/ |
63 KB 20 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
myGov-cobranded-logo-white.svg
puritneistnaso.cloud/poow/mygov/ato/img/ |
63 KB 20 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| Popper number| uidEvent object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
puritneistnaso.cloud
stackpath.bootstrapcdn.com
104.16.86.20
104.18.11.207
86.38.202.21
10b11a7c97b90bcf7ad520ac94c5769d08540ce1ee3b84d487c587bf128e3388
21d7c871495a30136d9381e3b7463a58c319c8c5343fd3cdfe91fe0c5ccac5b2
752ade9c5f3e699d294fb733a26f1ce2857cbe04a84a5c2b25268d088ceffe87
954aa858b3bffb8511bc41bc88b07d2b24597c37faf522550e26c9aa3b0d220d
9bc75183225320bc3ef771762c2413e31f3b1f40af989b7875af5f7a270170e3
bbe43f79021ee8fe705382bc99a8a124e42486a05b7fb2b534debc1b04e9373d
c776195ad46333c6c9a9fe3c74502ffea9a02faf122388ea3567922cc65a3060