vj-shah.com
Open in
urlscan Pro
199.116.250.170
Malicious Activity!
Public Scan
Submission: On May 16 via automatic, source openphish
Summary
This is the only time vj-shah.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 199.116.250.170 199.116.250.170 | 46549 (GVO) (GVO) | |
1 2 | 151.101.12.193 151.101.12.193 | 54113 (FASTLY) (FASTLY) | |
12 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
vj-shah.com
vj-shah.com |
2 MB |
2 |
imgur.com
1 redirects
i.imgur.com |
8 MB |
12 | 2 |
Domain | Requested by | |
---|---|---|
11 | vj-shah.com |
vj-shah.com
|
2 | i.imgur.com |
1 redirects
vj-shah.com
|
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.imgur.com DigiCert SHA2 Secure Server CA |
2020-01-15 - 2022-03-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/
Frame ID: 839FAB5DAC77C41F6C47E3AEB5EAAA1E
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 2- http://i.imgur.com/kwxPcY7.gif HTTP 301
- https://i.imgur.com/kwxPcY7.gif
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shape16880578.gif
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shape16847593.gif
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kwxPcY7.gif
i.imgur.com/ Redirect Chain
|
8 MB 8 MB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lo.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
68 KB 68 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
for.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
12.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
549 KB 550 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
591 KB 591 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
484 KB 484 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
519 KB 519 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footr.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
167 KB 168 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.png
vj-shah.com/imag/login/a196bd7056c31036a36880187ea8e429/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
i.imgur.com
vj-shah.com
151.101.12.193
199.116.250.170
15c4ca98d546f8e467d5a2fddec8f22cdeb0cbb1570fddee2f1ce3480df7463c
4bd099b0514a75c61cf489caae39d4cd223eda29a4c1c4c559195b072515915c
55d7c6b4a93bd6f009249d0b05f912cf8a280a7085787a285a7d4640ff6f4d84
63965a69a2df014af4b233916757923a5343aed27c44c494adb4bd72024ca23d
8e2e3c925e0e3c32ca06ec8d00cd071787435b53c8c8bd4f611a0ed74cf33648
ba4c2b1b77e89c05759dc1bd83b217f861272661266ca1d43f46931150ee4ac4
bae8d2372fe92aa450bfcecc0c69c351988269a7011eaca144b15211f2943837
be0003e54430d0902e3835cfff4891c779431a93aee46c020ed6c8a82783d052
ed3e7e89adf07182afc53ef7eafc97ae441eda966df998331575706ff8f02b4b
f22fc8ad82cc17bcb15f70bd047df2d55afa8be36f652f2a21016a0ff9f83aab
f93e59101e4fe2d0d6d721d23937af75176265d94e28c22b1d6a1af21b958e5b
fd8491447db1aaf0da13cbd7db0996892a021f2ad46aae88a20c12b6349e91f4