usp.usspwj.top
Open in
urlscan Pro
2a06:98c1:3120::3
Malicious Activity!
Public Scan
Submission: On February 04 via automatic, source openphish — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1P5 on January 31st 2024. Valid for: 3 months.
This is the only time usp.usspwj.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: USPS (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6810:f943 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
19 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
usspwj.top
usp.usspwj.top |
198 KB |
1 |
fonts.net
fast.fonts.net — Cisco Umbrella Rank: 3973 |
549 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
30 KB |
19 | 3 |
Domain | Requested by | |
---|---|---|
16 | usp.usspwj.top |
usp.usspwj.top
code.jquery.com |
1 | fast.fonts.net |
usp.usspwj.top
|
1 | code.jquery.com |
usp.usspwj.top
|
19 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
usspwj.top GTS CA 1P5 |
2024-01-31 - 2024-04-30 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-05 - 2024-05-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://usp.usspwj.top/pg?do=index
Frame ID: 8F6D09D54E01D3C3F628B37858C1A7C4
Requests: 19 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pg
usp.usspwj.top/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Information.css
usp.usspwj.top/loding_files/ |
97 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.0.0.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LaxJquery.js
usp.usspwj.top/Areas/Admin/Content/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
usp.usspwj.top/loding_files/ |
303 KB 58 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-01.svg
usp.usspwj.top/loding_files/ |
843 B 910 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-02.svg
usp.usspwj.top/loding_files/ |
843 B 907 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-03.svg
usp.usspwj.top/loding_files/ |
888 B 918 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-04.svg
usp.usspwj.top/loding_files/ |
843 B 905 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-05.svg
usp.usspwj.top/loding_files/ |
843 B 911 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-06.svg
usp.usspwj.top/loding_files/ |
843 B 902 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-07.svg
usp.usspwj.top/loding_files/ |
843 B 908 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-08.svg
usp.usspwj.top/loding_files/ |
843 B 945 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-09.svg
usp.usspwj.top/loding_files/ |
843 B 903 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
blue-spinner-processing-step-10.svg
usp.usspwj.top/loding_files/ |
843 B 916 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.css
fast.fonts.net/t/ |
0 549 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
4a9c62ab-b359-4081-8383-a0d1cdebd111.woff
usp.usspwj.top/assets/ |
46 KB 46 KB |
Font
application/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
d5af76d8-a90b-4527-b3a3-182207cc3250.woff
usp.usspwj.top/assets/ |
57 KB 58 KB |
Font
application/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
index
usp.usspwj.top/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- usp.usspwj.top
- URL
- https://usp.usspwj.top/index
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: USPS (Transportation)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
usp.usspwj.top/ | Name: ASP.NET_SessionId Value: 2ltbwwpv5waziuzvqqsgwria |
|
.fonts.net/ | Name: __cf_bm Value: bXkqnJN7f9wdtNesvSL16mgGXfxdy2CUWm1rh_T9P9g-1707008600-1-AQgM9sZVyy7w5iHHGePh5ktiJQCiq8zV6ouIafHvfNDWYLRbXLPB0x8wY9RceZ70wAcNsMwWiEtFEETFRZjxjjw= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fast.fonts.net
usp.usspwj.top
usp.usspwj.top
2606:4700::6810:f943
2a04:4e42:600::649
2a06:98c1:3120::3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