
usps-parcel-trackingid02934993.surge.sh
188.166.132.94
Malicious Activity!
Effective URL: https://usps-parcel-trackingid02934993.surge.sh/?ver=92392
Submission: On September 19 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on March 28th 2021. Valid for: a year.
This is the only time usps-parcel-trackingid02934993.surge.sh was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: USPS (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.10 67.199.248.10 | 396982 (GOOGLE-PR...) (GOOGLE-PRIVATE-CLOUD) | |
3 | 142.250.186.46 142.250.186.46 | 15169 (GOOGLE) (GOOGLE) | |
4 | 142.250.185.163 142.250.185.163 | 15169 (GOOGLE) (GOOGLE) | |
1 | 142.250.74.195 142.250.74.195 | 15169 (GOOGLE) (GOOGLE) | |
6 | 188.166.132.94 188.166.132.94 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 172.67.216.177 172.67.216.177 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 192.229.221.165 192.229.221.165 | 15133 (EDGECAST) (EDGECAST) | |
1 | 104.19.142.111 104.19.142.111 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
19 | 7 |
ASN15169 (GOOGLE, US)
PTR: fra24s04-in-f14.1e100.net
redirecturl000.page.link |
ASN15169 (GOOGLE, US)
PTR: fra16s51-in-f3.1e100.net
www.gstatic.com |
ASN15169 (GOOGLE, US)
PTR: fra24s02-in-f3.1e100.net
fonts.gstatic.com |
ASN14061 (DIGITALOCEAN-ASN, US)
usps-parcel-trackingid02934993.surge.sh |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
surge.sh
usps-parcel-trackingid02934993.surge.sh |
106 KB |
5 |
gstatic.com
www.gstatic.com fonts.gstatic.com |
115 KB |
3 |
usps.com
www.usps.com |
3 KB |
3 |
page.link
redirecturl000.page.link |
10 KB |
1 |
gyazo.com
i.gyazo.com |
23 KB |
1 |
scampage.cc
scampage.cc |
585 B |
1 |
bit.ly
1 redirects
bit.ly |
269 B |
19 | 7 |
Domain | Requested by | |
---|---|---|
6 | usps-parcel-trackingid02934993.surge.sh |
www.gstatic.com
usps-parcel-trackingid02934993.surge.sh |
4 | www.gstatic.com |
redirecturl000.page.link
www.gstatic.com |
3 | www.usps.com | |
3 | redirecturl000.page.link |
redirecturl000.page.link
www.gstatic.com |
1 | i.gyazo.com | |
1 | scampage.cc |
usps-parcel-trackingid02934993.surge.sh
|
1 | fonts.gstatic.com |
redirecturl000.page.link
|
1 | bit.ly | 1 redirects |
19 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.page.link GTS CA 1C3 |
2021-08-30 - 2021-11-22 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-08-30 - 2021-11-22 |
3 months | crt.sh |
*.surge.sh Sectigo RSA Domain Validation Secure Server CA |
2021-03-28 - 2022-04-25 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-17 - 2022-09-16 |
a year | crt.sh |
*.usps.com DigiCert SHA2 Secure Server CA |
2020-05-14 - 2022-05-16 |
2 years | crt.sh |
*.gyazo.com GeoTrust TLS DV RSA Mixed SHA256 2020 CA-1 |
2021-03-23 - 2022-04-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://usps-parcel-trackingid02934993.surge.sh/?ver=92392
Frame ID: 9E91D0F366256CDEE29B863B1E7EC135
Requests: 19 HTTP requests in this frame
Screenshot

Page URL History Show full URLs
-
https://bit.ly/39y9hd3
HTTP 301
https://redirecturl000.page.link/Go1D?lidk=FP12C Page URL
- https://usps-parcel-trackingid02934993.surge.sh/?ver=92392 Page URL
Detected technologies
Detected patterns
- <div [^>]*id="__nuxt"
- /_nuxt/
Page Statistics
19
Requests
100
%
HTTPS
0
%
IPv6
7
Domains
8
Subdomains
7
IPs
3
Countries
258
kB
Transfer
666
kB
Size
3
Cookies
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bit.ly/39y9hd3
HTTP 301
https://redirecturl000.page.link/Go1D?lidk=FP12C Page URL
- https://usps-parcel-trackingid02934993.surge.sh/?ver=92392 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://bit.ly/39y9hd3 HTTP 301
- https://redirecturl000.page.link/Go1D?lidk=FP12C
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Go1D
redirecturl000.page.link/ Redirect Chain
|
32 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
cspreport
redirecturl000.page.link/_/DurableDeepLinkUi/ |
0 208 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m=_b,_tp
www.gstatic.com/_/mss/boq-devplatform/_/js/k=boq-devplatform.DurableDeepLinkUi.en_US.YQ7JinZx8Tg.es5.O/am=AgAE/d=1/excm=_b,_tp,viewddl/ed=1/dg=0/wt=2/esmo=1/rs=ADpVLP5ZoXqrk8khaI7ngmbBchHKS5AcPA/ |
157 KB 56 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v18/ |
10 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
m=byfTOb,lsjVmc,LEikZe
www.gstatic.com/_/mss/boq-devplatform/_/js/k=boq-devplatform.DurableDeepLinkUi.en_US.YQ7JinZx8Tg.es5.O/ck=boq-devplatform.DurableDeepLinkUi.RTJt8TNAIM0.L.W1.O/am=AgAE/d=1/exm=_b,_tp/excm=_b,_tp,vie... |
35 KB 13 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
m=xUdipf,blwjVc,fKUV3e,aurFic,ws9Tlc,COQbmf,U0aPgd,NwH0H,OmgaI,gychg,lfpdyf,ZfAoz,PQaYAf,lPKSwe,yDVVkb,KG2eXe,xcPxA
www.gstatic.com/_/mss/boq-devplatform/_/js/k=boq-devplatform.DurableDeepLinkUi.en_US.YQ7JinZx8Tg.es5.O/ck=boq-devplatform.DurableDeepLinkUi.RTJt8TNAIM0.L.W1.O/am=AgAE/d=1/exm=LEikZe,_b,_tp,byfTOb,l... |
79 KB 28 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
batchexecute
redirecturl000.page.link/_/DurableDeepLinkUi/data/ |
140 B 174 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
m=Wt6vjf,_latency,FCpbqb,WhJNk
www.gstatic.com/_/mss/boq-devplatform/_/js/k=boq-devplatform.DurableDeepLinkUi.en_US.YQ7JinZx8Tg.es5.O/ck=boq-devplatform.DurableDeepLinkUi.RTJt8TNAIM0.L.W1.O/am=AgAE/d=1/exm=COQbmf,KG2eXe,LEikZe,N... |
18 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
usps-parcel-trackingid02934993.surge.sh/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5ac4b0c.js
usps-parcel-trackingid02934993.surge.sh/_nuxt/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
340edff.js
usps-parcel-trackingid02934993.surge.sh/_nuxt/ |
217 KB 76 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bddd75b.js
usps-parcel-trackingid02934993.surge.sh/_nuxt/ |
74 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
11ce98c.js
usps-parcel-trackingid02934993.surge.sh/_nuxt/ |
119 B 572 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9c83f61.js
usps-parcel-trackingid02934993.surge.sh/_nuxt/ |
12 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check
scampage.cc/ |
1 B 585 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hamburger.svg
www.usps.com/assets/images/home/ |
546 B 397 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_mobile.svg
www.usps.com/assets/images/home/ |
2 KB 1012 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
search.svg
www.usps.com/assets/images/home/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
290b715a39c9f2b9c966442d0849dbe9.png
i.gyazo.com/ |
22 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: USPS (Transportation)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| __NUXT__ object| webpackJsonp function| installComponents object| regeneratorRuntime function| setImmediate function| clearImmediate object| onNuxtReadyCbs function| onNuxtReady object| $nuxt3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bit.ly/ | Name: _bit Value: l8j6gH-1fcd4f4b84c9d8dcdc-00D |
|
redirecturl000.page.link/ | Name: OTZ Value: 6162137_56_56__56_ |
|
i.gyazo.com/ | Name: Gyazo_cfwoker Value: i |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | script-src 'nonce-K+PiNKwJbpe84fx4mEnQTw' 'unsafe-inline';object-src 'self';base-uri 'self';report-uri /_/DurableDeepLinkUi/cspreport;worker-src 'self' require-trusted-types-for 'script';report-uri /_/DurableDeepLinkUi/cspreport |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bit.ly
fonts.gstatic.com
i.gyazo.com
redirecturl000.page.link
scampage.cc
usps-parcel-trackingid02934993.surge.sh
www.gstatic.com
www.usps.com
104.19.142.111
142.250.185.163
142.250.186.46
142.250.74.195
172.67.216.177
188.166.132.94
192.229.221.165
67.199.248.10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