qmed.sme.sltidc.lk
Open in
urlscan Pro
222.165.190.228
Malicious Activity!
Public Scan
Effective URL: http://qmed.sme.sltidc.lk/iglas/aple/auth/xN9dG1/login.php?id=79346684
Submission: On June 18 via api from TR — Scanned from DE
Summary
This is the only time qmed.sme.sltidc.lk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 89.252.190.50 89.252.190.50 | 203576 (INTERNETB...) (INTERNETBILISIM) | |
3 16 | 222.165.190.228 222.165.190.228 | 9329 (SLTINT-AS...) (SLTINT-AS-AP Sri Lanka Telecom Internet) | |
2 | 2a04:4e42::485 2a04:4e42::485 | 54113 (FASTLY) (FASTLY) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE) | |
21 | 7 |
ASN203576 (INTERNETBILISIM, TR)
PTR: server.4treeweb.com
www.mycheaptransfer.com |
ASN9329 (SLTINT-AS-AP Sri Lanka Telecom Internet, LK)
PTR: neo.sltidc.lk
qmed.sme.sltidc.lk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
sltidc.lk
3 redirects
qmed.sme.sltidc.lk |
95 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 265 |
413 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 373 |
49 KB |
1 |
gstatic.com
fonts.gstatic.com |
48 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 77 |
2 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 814 |
31 KB |
1 |
mycheaptransfer.com
www.mycheaptransfer.com |
319 B |
21 | 7 |
Domain | Requested by | |
---|---|---|
16 | qmed.sme.sltidc.lk |
3 redirects
www.mycheaptransfer.com
qmed.sme.sltidc.lk |
2 | cdnjs.cloudflare.com |
qmed.sme.sltidc.lk
|
2 | cdn.jsdelivr.net |
qmed.sme.sltidc.lk
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
qmed.sme.sltidc.lk
|
1 | code.jquery.com |
qmed.sme.sltidc.lk
|
1 | www.mycheaptransfer.com | |
21 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mycheaptransfer.com R3 |
2024-05-26 - 2024-08-24 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
cdnjs.cloudflare.com E1 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-05-27 - 2024-08-19 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-05-27 - 2024-08-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://qmed.sme.sltidc.lk/iglas/aple/auth/xN9dG1/login.php?id=79346684
Frame ID: E72FD973DF4E9B8A91E868D4D026CE2E
Requests: 21 HTTP requests in this frame
Screenshot
Page Title
Manage your Apple IDPage URL History Show full URLs
-
http://www.mycheaptransfer.com/223464DWNTF223464DWNTF/nauticentricnauticentric.html
HTTP 307
https://www.mycheaptransfer.com/223464DWNTF223464DWNTF/nauticentricnauticentric.html Page URL
-
http://qmed.sme.sltidc.lk/iglas/aple/
HTTP 307
https://qmed.sme.sltidc.lk/iglas/aple/ HTTP 302
https://qmed.sme.sltidc.lk/iglas/aple/auth/?pwd=apple HTTP 307
http://qmed.sme.sltidc.lk/iglas/aple/ HTTP 302
http://qmed.sme.sltidc.lk/iglas/aple/auth/?pwd=apple HTTP 302
http://qmed.sme.sltidc.lk/iglas/aple/auth/xN9dG1/login.php?id=79346684 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.mycheaptransfer.com/223464DWNTF223464DWNTF/nauticentricnauticentric.html
HTTP 307
https://www.mycheaptransfer.com/223464DWNTF223464DWNTF/nauticentricnauticentric.html Page URL
-
http://qmed.sme.sltidc.lk/iglas/aple/
HTTP 307
https://qmed.sme.sltidc.lk/iglas/aple/ HTTP 302
https://qmed.sme.sltidc.lk/iglas/aple/auth/?pwd=apple HTTP 307
http://qmed.sme.sltidc.lk/iglas/aple/ HTTP 302
http://qmed.sme.sltidc.lk/iglas/aple/auth/?pwd=apple HTTP 302
http://qmed.sme.sltidc.lk/iglas/aple/auth/xN9dG1/login.php?id=79346684 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.mycheaptransfer.com/223464DWNTF223464DWNTF/nauticentricnauticentric.html HTTP 307
- https://www.mycheaptransfer.com/223464DWNTF223464DWNTF/nauticentricnauticentric.html
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
nauticentricnauticentric.html
www.mycheaptransfer.com/223464DWNTF223464DWNTF/ Redirect Chain
|
293 B 319 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
qmed.sme.sltidc.lk/iglas/aple/auth/xN9dG1/ Redirect Chain
|
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
helpers.css
qmed.sme.sltidc.lk/iglas/aple/auth/media/css/ |
41 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
qmed.sme.sltidc.lk/iglas/aple/auth/media/css/ |
12 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hamburger.png
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
267 B 550 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apple.svg
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
863 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shop.svg
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
477 B 764 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-down.png
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
468 B 751 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apple-login.png
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.png
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
532 B 815 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-up.png
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
412 B 695 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.1.min.js
code.jquery.com/ |
88 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/ |
77 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
all.min.js
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.2.0/js/ |
1 MB 410 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.mask.min.js
cdnjs.cloudflare.com/ajax/libs/jquery.mask/1.14.16/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js.js
qmed.sme.sltidc.lk/iglas/aple/auth/media/js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
17 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search.svg
qmed.sme.sltidc.lk/iglas/aple/auth/media/imgs/ |
541 B 828 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/ |
47 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ff.ico
qmed.sme.sltidc.lk/iglas/aple/media/imgs/ |
226 B 394 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence function| $ function| jQuery number| uidEvent object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome object| $jscomp boolean| loaded1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
qmed.sme.sltidc.lk/ | Name: PHPSESSID Value: l3fdpob0heaj98ss6c0tj18bq1 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
qmed.sme.sltidc.lk
www.mycheaptransfer.com
104.17.24.14
222.165.190.228
2a00:1450:4001:800::200a
2a00:1450:4001:81d::2003
2a04:4e42:600::649
2a04:4e42::485
89.252.190.50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