akankshamodi.com
Open in
urlscan Pro
134.119.219.247
Malicious Activity!
Public Scan
Submission Tags: 7378593
Submission: On December 09 via api from US — Scanned from DE
Summary
This is the only time akankshamodi.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Excel / PDF download (Online) OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 134.119.219.247 134.119.219.247 | 29066 (VELIANET-...) (VELIANET-AS velia.net Internetdienste GmbH) | |
11 | 1 |
ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE)
akankshamodi.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
akankshamodi.com
akankshamodi.com |
1 MB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | akankshamodi.com |
akankshamodi.com
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://akankshamodi.com/audio/auth.php?authlink=offb231101
Frame ID: DECBA55D739A3EA673A231926906FD19
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
auth.php
akankshamodi.com/audio/ |
36 KB 36 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
akankshamodi.com/audio/db_files/ |
141 KB 142 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
offcanvas.css
akankshamodi.com/audio/db_files/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white-onedrive.svg
akankshamodi.com/audio/db_files/ |
96 KB 96 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pdf.png
akankshamodi.com/audio/wng_files/ |
60 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
outlook-anim.gif
akankshamodi.com/audio/db_files/ |
603 KB 603 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.gif
akankshamodi.com/audio/db_files/ |
68 KB 68 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
akankshamodi.com/audio/db_files/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js.download
akankshamodi.com/audio/db_files/ |
48 KB 48 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js.download
akankshamodi.com/audio/db_files/ |
19 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
holder.min.js.download
akankshamodi.com/audio/db_files/ |
32 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Excel / PDF download (Online) OneDrive (Online)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| foo function| $ function| jQuery object| bootstrap function| Popper object| Holder0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
akankshamodi.com
134.119.219.247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