ehse.in
Open in
urlscan Pro
176.9.61.27
Malicious Activity!
Public Scan
Submission: On November 30 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 9th 2020. Valid for: 3 months.
This is the only time ehse.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 176.9.61.27 176.9.61.27 | 24940 (HETZNER-AS) (HETZNER-AS) | |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | ehse.in |
ehse.in
|
9 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
netflix.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ehse.in cPanel, Inc. Certification Authority |
2020-11-09 - 2021-02-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ehse.in/old_files/lib/revolution/net/update.php
Frame ID: BC2D24F38C13BE5288D676AA86AFC8C4
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Sign Out
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
update.php
ehse.in/old_files/lib/revolution/net/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
update.css
ehse.in/old_files/lib/revolution/net/res/css/ |
2 KB 832 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
ehse.in/old_files/lib/revolution/net/res/js/ |
286 KB 84 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
ehse.in/old_files/lib/revolution/net/res/js/ |
23 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
ehse.in/old_files/lib/revolution/net/res/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
visa.svg
ehse.in/old_files/lib/revolution/net/res/img/ |
1 KB 696 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ms.svg
ehse.in/old_files/lib/revolution/net/res/img/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amex.svg
ehse.in/old_files/lib/revolution/net/res/img/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
discover.png
ehse.in/old_files/lib/revolution/net/res/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| isNumberKey function| onLogin0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ehse.in
176.9.61.27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