pittsburghx.ml
Open in
urlscan Pro
2606:4700:30::681b:a2f0
Malicious Activity!
Public Scan
Submission: On November 14 via automatic, source openphish
Summary
This is the only time pittsburghx.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Etisalat (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:30:... 2606:4700:30::681b:a2f0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
10 | 2606:4700:30:... 2606:4700:30::681b:a3f0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
pittsburghx.ml |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
pittsburghx.ml |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
pittsburghx.ml
pittsburghx.ml |
305 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | pittsburghx.ml |
pittsburghx.ml
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://pittsburghx.ml/king/myeBill/dcm2-etisalat-eBILL.html
Frame ID: FA3E958602899944F7756950C1168B7E
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
Dojo (JavaScript Libraries) Expand
Detected patterns
- env /^dojo$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
dcm2-etisalat-eBILL.html
pittsburghx.ml/king/myeBill/ |
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
pittsburghx.ml/king/myeBill/files/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dojo.css
pittsburghx.ml/king/js/dojotoolkit/dojo/resources/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dijit.css
pittsburghx.ml/king/js/dojotoolkit/dijit/themes/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dijit_rtl.css
pittsburghx.ml/king/js/dojotoolkit/dijit/themes/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Button.css
pittsburghx.ml/king/js/dojotoolkit/dijit/themes/tundra/form/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DropDownSelect.css
pittsburghx.ml/king/js/dojotoolkit/dojox/form/resources/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
analytics.js
pittsburghx.ml/king/myeBill/files/ |
26 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dojo.js
pittsburghx.ml/king/myeBill/files/ |
303 KB 90 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blank.gif
pittsburghx.ml/king/myeBill/files/ |
43 B 409 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dojo_en-us.js
pittsburghx.ml/king/myeBill/files/nls/ |
353 B 638 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
pittsburghx.ml/king/myeBill/files/ |
194 KB 195 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
greyband.jpg
pittsburghx.ml/king/myeBill/files/ |
458 B 826 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
info.png
pittsburghx.ml/king/myeBill/images/ |
345 B 345 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.jpg
pittsburghx.ml/king/myeBill/files/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Etisalat (Telecommunication)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| ga object| gaplugins object| dojo object| dijit object| dojox1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pittsburghx.ml/ | Name: __cfduid Value: da47b01886e93909c189fbd03959948b01542161651 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pittsburghx.ml
2606:4700:30::681b:a2f0
2606:4700:30::681b:a3f0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