www.mig.co.id
Open in
urlscan Pro
45.32.112.173
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On September 06 via api from FI — Scanned from SG
Summary
TLS certificate: Issued by E5 on July 4th 2024. Valid for: 3 months.
This is the only time www.mig.co.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Gesundheitskasse (Health Insurance)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 45.32.112.173 45.32.112.173 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 2404:6800:400... 2404:6800:4003:c02::5f | 15169 (GOOGLE) (GOOGLE) | |
1 | 2404:6800:400... 2404:6800:4003:c05::5f | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3033::ac43:9455 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3036::6815:1d27 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2404:6800:400... 2404:6800:4003:c03::5e | 15169 (GOOGLE) (GOOGLE) | |
1 | 172.67.148.85 172.67.148.85 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 8 |
ASN20473 (AS-CHOOPA, US)
PTR: 45.32.112.173.vultrusercontent.com
www.mig.co.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
0zz0.com
www8.0zz0.com www12.0zz0.com www9.0zz0.com |
33 KB |
3 |
mig.co.id
www.mig.co.id |
6 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 fonts.googleapis.com — Cisco Umbrella Rank: 110 |
33 KB |
1 |
gstatic.com
fonts.gstatic.com |
48 KB |
0 |
flaticon.com
Failed
cdn.flaticon.com Failed |
|
11 | 5 |
Domain | Requested by | |
---|---|---|
3 | www.mig.co.id |
www.mig.co.id
|
2 | www12.0zz0.com |
www.mig.co.id
|
1 | www9.0zz0.com | |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | www8.0zz0.com |
www.mig.co.id
|
1 | fonts.googleapis.com |
www.mig.co.id
|
1 | ajax.googleapis.com |
www.mig.co.id
|
0 | cdn.flaticon.com Failed |
www.mig.co.id
|
11 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.mig.co.id E5 |
2024-07-04 - 2024-10-02 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-08-12 - 2024-11-04 |
3 months | crt.sh |
0zz0.com WE1 |
2024-08-10 - 2024-11-08 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-08-12 - 2024-11-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.mig.co.id/main/ogk/main/index.php
Frame ID: 97F73FD7A0DF5FE0B85E83956D36D34D
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
www.mig.co.id/main/ogk/main/ |
12 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.mig.co.id/main/ogk/main/style/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.3/ |
88 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
23 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
613882479.png
www8.0zz0.com/2023/08/05/01/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585748753.png
www12.0zz0.com/2023/08/05/01/ |
866 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.js
www.mig.co.id/main/ogk/main/style/ |
1 KB 704 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
694701060.png
www12.0zz0.com/2023/08/05/02/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
44386.svg
cdn.flaticon.com/svg/44/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/ |
47 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
273994248.jpg
www9.0zz0.com/2023/09/04/11/ |
7 KB 8 KB |
Other
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdn.flaticon.com
- URL
- https://cdn.flaticon.com/svg/44/44386.svg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Gesundheitskasse (Health Insurance)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| validateForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.flaticon.com
fonts.googleapis.com
fonts.gstatic.com
www.mig.co.id
www12.0zz0.com
www8.0zz0.com
www9.0zz0.com
cdn.flaticon.com
172.67.148.85
2404:6800:4003:c02::5f
2404:6800:4003:c03::5e
2404:6800:4003:c05::5f
2606:4700:3033::ac43:9455
2606:4700:3036::6815:1d27
45.32.112.173
13cf968b571fe1be4e4358f2b1a7ba3b1846ae40a2efb9fe0d145e268da8ef61
1729b9a1365071ef0f44e0a0cf4e4496cc04f3b81fc6b4f345e6ea4f41294cae
1e8c2d036ba1b5cd224d69aa308ec7373cd4b29d7ca4184659743d172efbee22
2af467e5c74d9700a4f33f351d77f5d9a20abf58203d5dfdc5209095d8acf768
3c4d6a1421c7ddb7e404521fe8c4cd5be5af446d7689cd880be26612eaad3cfa
400f09145a60d7216c0b10cb93a1b10a4d04dd471b30e5e365b48888033d895f
97add70ea4e82650447aececff69ee5c4a938be1e1e8deb31e538e9fcfe1c83a
9c2ab8c0b0eac44834a380ad5b8072d849f6cf1722f74b2fb022de079a711c28
a6f3f0faea4b3d48e03176341bef0ed3151ffbf226d4c6635f1c6039c0500575
e3ad45e2e969cbdd6a1424dd5f99adf0e513fc8664fca2d6ac947ee5ef08a3ad