inpost.pl.ddpayitemssforr.pw
Open in
urlscan Pro
45.141.76.48
Malicious Activity!
Public Scan
Submission Tags: 7250817
Submission: On July 31 via api from NL
Summary
TLS certificate: Issued by R3 on July 30th 2021. Valid for: 3 months.
This is the only time inpost.pl.ddpayitemssforr.pw was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: InPost (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 13 | 45.141.76.48 45.141.76.48 | 198610 (BEGET-AS) (BEGET-AS) | |
3 | 91.216.25.161 91.216.25.161 | 196899 (INTEGER) (INTEGER) | |
13 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
ddpayitemssforr.pw
3 redirects
inpost.pl.ddpayitemssforr.pw |
484 KB |
3 |
inpost.pl
inpost.pl |
2 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
13 | inpost.pl.ddpayitemssforr.pw |
3 redirects
inpost.pl.ddpayitemssforr.pw
|
3 | inpost.pl | |
13 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
inpost.pl |
grupainteger.logintrade.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
inpost.pl.ddpayitemssforr.pw R3 |
2021-07-30 - 2021-10-28 |
3 months | crt.sh |
*.inpost.pl RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1 |
2020-10-27 - 2021-11-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://inpost.pl.ddpayitemssforr.pw/track72031344
Frame ID: C33EE6FF866718C7AFC19C2B76E0DF23
Requests: 13 HTTP requests in this frame
14 Outgoing links
These are links going to different origins than the main page.
Title: Odbieram
Search URL Search Domain Scan URL
Title: Wysyłam
Search URL Search Domain Scan URL
Title: Oferta dla Firm
Search URL Search Domain Scan URL
Title: O InPost
Search URL Search Domain Scan URL
Title: Kariera
Search URL Search Domain Scan URL
Title: Cennik
Search URL Search Domain Scan URL
Title: Kontakt
Search URL Search Domain Scan URL
Title: Śledź paczkę
Search URL Search Domain Scan URL
Title: Znajdź Paczkomat
Search URL Search Domain Scan URL
Title: Fundacja InPost
Search URL Search Domain Scan URL
Title: Szybkie Nadania
Search URL Search Domain Scan URL
Title: Dla dostawców
Search URL Search Domain Scan URL
Title: Reklama z InPost
Search URL Search Domain Scan URL
Title: Regulaminy
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 6- https://inpost.pl.ddpayitemssforr.pw/opencheck.php HTTP 302
- https://inpost.pl/opencheck.php
- https://inpost.pl.ddpayitemssforr.pw/sendopen.php HTTP 302
- https://inpost.pl/sendopen.php
- https://inpost.pl.ddpayitemssforr.pw/opencheck.php HTTP 302
- https://inpost.pl/opencheck.php
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
track72031344
inpost.pl.ddpayitemssforr.pw/ |
32 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search.png
inpost.pl.ddpayitemssforr.pw/ |
1019 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sledzenie1.png
inpost.pl.ddpayitemssforr.pw/ |
158 KB 158 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sledzenie2.png
inpost.pl.ddpayitemssforr.pw/ |
66 KB 67 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
operator-img.png
inpost.pl.ddpayitemssforr.pw/ |
123 KB 123 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.php
inpost.pl.ddpayitemssforr.pw/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chap.png
inpost.pl.ddpayitemssforr.pw/ |
476 B 781 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opencheck.php
inpost.pl/ Redirect Chain
|
16 B 615 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
support.php
inpost.pl.ddpayitemssforr.pw/ |
635 B 619 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sendopen.php
inpost.pl/ Redirect Chain
|
16 B 757 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
operator-img.png
inpost.pl.ddpayitemssforr.pw/ |
123 KB 123 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opencheck.php
inpost.pl/ Redirect Chain
|
16 B 615 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
support.php
inpost.pl.ddpayitemssforr.pw/ |
635 B 619 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: InPost (Transportation)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| supportbutton object| supportwindow object| docdoc object| chatscroll object| smstosupbutton object| msgtext function| ajaxsup function| sendmsg function| opencheck function| openwrite1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
inpost.pl.ddpayitemssforr.pw/ | Name: 0800fc577294c34e0b28ad2839435945 Value: M2ZiYzMyMGJjODA3MmExOTk1YzQ2ZWEzYzMxNmQxMGY%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
inpost.pl
inpost.pl.ddpayitemssforr.pw
45.141.76.48
91.216.25.161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