qantas.myservice.live
Open in
urlscan Pro
8.210.42.17
Malicious Activity!
Public Scan
Effective URL: https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/login/
Submission: On January 07 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by R3 on January 7th 2021. Valid for: 3 months.
This is the only time qantas.myservice.live was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Qantas (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 20 | 8.210.42.17 8.210.42.17 | 45102 (CNNIC-ALI...) (CNNIC-ALIBABA-US-NET-AP Alibaba (US) Technology Co.) | |
18 | 1 |
ASN45102 (CNNIC-ALIBABA-US-NET-AP Alibaba (US) Technology Co., Ltd., CN)
qantas.myservice.live |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
myservice.live
2 redirects
qantas.myservice.live |
609 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
20 | qantas.myservice.live |
2 redirects
qantas.myservice.live
|
18 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
myservice.live R3 |
2021-01-07 - 2021-04-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/login/
Frame ID: 0855A7F548145209E26263FD6D44A03E
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://qantas.myservice.live/ Page URL
-
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785
HTTP 301
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/ HTTP 302
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/login/ Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- html /<div class="[^"]*parbase/i
Java (Programming Languages) Expand
Detected patterns
- html /<div class="[^"]*parbase/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://qantas.myservice.live/ Page URL
-
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785
HTTP 301
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/ HTTP 302
https://qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
qantas.myservice.live/ |
728 B 698 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
qantas.myservice.live/frequent-flyer/7463c188e7aa2cba750bf134d8e11785/login/ Redirect Chain
|
27 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
qantas.myservice.live/bower_components/jquery/dist/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
qantas.myservice.live/bower_components/ua-parser-js/dist/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
qantas.myservice.live/bower_components/font-awesome/css/ |
30 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
qantas.myservice.live/core/form/ |
16 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
qantas.myservice.live/core/form/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
qantas.myservice.live/login/form/ |
199 B 444 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.min.2a59980d09662444d23feab128b9acfa.css
qantas.myservice.live/login/ |
186 KB 186 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.bundle.css
qantas.myservice.live/login/ |
114 B 359 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
qantas.myservice.live/login/ |
50 KB 51 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-noncritical.min.7813760a0650572c476ec4027d786bfe.css
qantas.myservice.live/login/ |
65 KB 66 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
optanon.css
qantas.myservice.live/login/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
QANTAS-Centenary-24px.svg
qantas.myservice.live/login/ |
13 KB 13 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
qantas.myservice.live/login/form/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spritesheet-9632fb7044385395ce89846b873ea4e3.png
qantas.myservice.live/login/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
315CA1_3_0.woff2
qantas.myservice.live/login/ |
48 KB 49 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
315CA1_1_0.woff2
qantas.myservice.live/login/ |
49 KB 49 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Qantas (Transportation)35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| UAParser function| ask_def_proxy function| next__ function| preFinish__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| send1 string| bid object| php_js object| loader_ string| el2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
qantas.myservice.live/ | Name: bid Value: 7463c188e7aa2cba750bf134d8e11785 |
|
qantas.myservice.live/ | Name: real Value: OK |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
qantas.myservice.live
8.210.42.17
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
1e5c057c32de71d29c585b09b0562497b93c5f12c88214e79c81d2c2c8e6c398
39a2cf5d04df079c795ff8fbd5331af0ad118a3726ac317e3f1e8bcedc0071f3
3d9df5487d40efbc5b334204f8e5a34217b577ce7347ef5cb305066baf89a1ac
4ba0ad592a9744187492773b01f431117d77c17c540fbb5d151c2f14315d5885
564c11a6d2b5f6d64dbfcb00ef27a880cade69487f964361ceffb213f27436e5
71ed6d386b107b71653613a86944ad8f04fad6bceae9e761a21d5e60f956d226
752c791c40d61527a4158e0da5ba64bf418d210ca2da90a4fbf55a60d7fb6a60
75eee9dcf5bf3366fe5d7fcdf218a61f808d8ec2449983e74ed6ddc204fdda15
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
7bb204194d0cd543fe166ad633f0ad71ee82913beecdfaabb5c1cde466d252b1
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
8dc003a84681e3c82daac2ccb8818abf62d1b0fdbf3075be3f155ca9a3bbeaf2
8ee72b870f333d99caf97671efaa921f9b64a772dc43898c360ef7e3d3c0c588
acfecce6970a2ec8db6bbf3a51bcec7b2936d8930b0b7c84a079a315adb7b6c3
b2b64e5d45e5f4911d34343f60b7d15ba57d7ce1e4cc5dd69ac424bb79d84455
b964d246defe2ccf6dd3a0d3887ac9d09325a866b94bd57732219406654698a2
c836377b3f878bb339f820600c13435c8e88490e176bedf5af928c927b229353