![](/screenshots/590a376c-0ef8-41ed-a650-d3b1bd48587a.png)
www.dwarkaexpresswaynewproject.in
Open in
urlscan Pro
2606:4700:3037::6812:329a
Malicious Activity!
Public Scan
Effective URL: https://www.dwarkaexpresswaynewproject.in/xender/o6011cmc4nqqp9fepcobpnji.php?email=larry.lunders@jeffco.k12.co.us&1CF92H1592943661c84249c...
Submission: On June 23 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on October 27th 2019. Valid for: a year.
This is the only time www.dwarkaexpresswaynewproject.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
2 4 | 2606:4700:303... 2606:4700:3037::6812:329a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u17134070.ct.sendgrid.net |
ASN13335 (CLOUDFLARENET, US)
www.dwarkaexpresswaynewproject.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
dwarkaexpresswaynewproject.in
2 redirects
www.dwarkaexpresswaynewproject.in |
371 KB |
1 |
sendgrid.net
1 redirects
u17134070.ct.sendgrid.net |
289 B |
2 | 2 |
Domain | Requested by | |
---|---|---|
4 | www.dwarkaexpresswaynewproject.in |
2 redirects
www.dwarkaexpresswaynewproject.in
|
1 | u17134070.ct.sendgrid.net | 1 redirects |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-10-27 - 2020-10-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.dwarkaexpresswaynewproject.in/xender/o6011cmc4nqqp9fepcobpnji.php?email=larry.lunders@jeffco.k12.co.us&1CF92H1592943661c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9&AP___=&error=
Frame ID: B3ADD8E92D16E26498CE0AAAEC5924EE
Requests: 4 HTTP requests in this frame
Screenshot
![](/screenshots/590a376c-0ef8-41ed-a650-d3b1bd48587a.png)
Page URL History Show full URLs
-
https://u17134070.ct.sendgrid.net/ls/click?upn=PkrGeI8pErIyWr1uLLFfCzTLt4pIPmHvBF5V-2BvVrGoMwBXzntg1ofWVJ5Qiu3...
HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender?email=larry.lunders@jeffco.k12.co.us HTTP 301
https://www.dwarkaexpresswaynewproject.in/xender/?email=larry.lunders@jeffco.k12.co.us HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender/o6011cmc4nqqp9fepcobpnji.php?email=larry.lunders@jeffco.k12.co.us&1CF... Page URL
Detected technologies
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u17134070.ct.sendgrid.net/ls/click?upn=PkrGeI8pErIyWr1uLLFfCzTLt4pIPmHvBF5V-2BvVrGoMwBXzntg1ofWVJ5Qiu3cuvly-2BzPWjGcLRIw5uKi0ISzIu8v1XN8-2BBIIaQGHqBFgrcALOquGNzgBHwrfKFt7v1SvlVN_rSYIg1fouQWMEFcAes1VbuVJPg1f-2FvsTcyQ6nRuBI4gE8XrFaSnNtquspZParxkcmL-2FBdNwbe5IlRMsXG-2Buk4LR3Y3MrFx0xEJBTf919YIKvzllpSkiiuinmS-2F-2FujgOLq7oElPwVcXtEYxhsktqzbO5UOXi8buxa6iRNfE79VaaHnGKI8KLZO0Y3rQ5YalHldsdre-2F05TCwA4zt-2F-2ByERoItQvomVEuaUUJRC3u4h6IgzB5sa9C-2BBcmpoemQeQKF1
HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender?email=larry.lunders@jeffco.k12.co.us HTTP 301
https://www.dwarkaexpresswaynewproject.in/xender/?email=larry.lunders@jeffco.k12.co.us HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender/o6011cmc4nqqp9fepcobpnji.php?email=larry.lunders@jeffco.k12.co.us&1CF92H1592943661c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9c84249c9216fa404134e98b2dc8831d9&AP___=&error= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
o6011cmc4nqqp9fepcobpnji.php
www.dwarkaexpresswaynewproject.in/xender/ Redirect Chain
|
478 KB 354 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
273 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Product.ttf
www.dwarkaexpresswaynewproject.in/xender/ |
40 KB 17 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.dwarkaexpresswaynewproject.in/ | Name: __cfduid Value: d8df7e38fc01d152ce7e3c8cca69205441592943662 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
u17134070.ct.sendgrid.net
www.dwarkaexpresswaynewproject.in
167.89.123.16
2606:4700:3037::6812:329a
5f28283e08b3cc8f62c457e1bdbb782dcf3ebbb29ee1359d3dfaf0bca5771591
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f
b34cbb71d75b84eb4925f51e050249f65fb3e3550133aba0a4c161c6820aec82
e166efe12f0033e2a9e3339cdeaa31beb4edecc489be513fd95877868e65cca4