garlandactivewear.com
Open in
urlscan Pro
104.21.92.242
Malicious Activity!
Public Scan
Submission Tags: 7004095
Submission: On March 07 via api from NL
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on August 18th 2020. Valid for: a year.
This is the only time garlandactivewear.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DPD (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 104.21.92.242 104.21.92.242 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
garlandactivewear.com
garlandactivewear.com |
167 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | garlandactivewear.com |
garlandactivewear.com
|
9 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
shipping.dpd.ie |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-18 - 2021-08-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://garlandactivewear.com/wp-content/cache/critical-css/nnb/delivery-address.html
Frame ID: 3E432F86BE5998DA7B57399CE702DC77
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Klicken Sie hier
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
delivery-address.html
garlandactivewear.com/wp-content/cache/critical-css/nnb/ |
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layout.css
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
266 KB 40 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
order-process.css
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
99 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
455.large.png
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
455.small.png
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PlutoSansDPDLight-Web.woff
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
59 KB 60 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layout.css
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
266 KB 40 KB |
Font
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bullet-icon.png
garlandactivewear.com/wp-content/cache/critical-css/nnb/welcome/ |
784 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DPD (Transportation)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.garlandactivewear.com/ | Name: __cfduid Value: dc73068b7a2a9d74af1bc5831c09b8c251615159788 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
garlandactivewear.com
104.21.92.242
5f50f1b72e7259c5c165ec667e79f1dc498c117217a9e7774216a22b265c9d44
764939c2b087d7eb7d7b54c7763e69cffc6476f59ad71691414eeeceb687a298
7e4334d1d5d1c5aa0cdcd85bc262e948ee2fdeff652a80a61c9c1411231992d7
90686a9a8905702ec7b5c48d62082f18ac7f537c6357c713365983ca30905fc5
9e462606602d426b676f2b6f9c0b6629b02f91204214898f7d4a56749c4e00d0
a23c1fba92c330adfd380b7f899d41e7bdea54fbe91486283adf09fac37b41e5
c905517d5e29f5e275d4052cdf47c0b8e86885d7659f5cab1515e76a54ca4259
d1279be257d81aff851b00ab49ba9bf8699eae1613582f5b6a9fcb630d939094
f47fcf5a27944d3e0982fce17474335cc9666005e6513d49c4bdad862044ab1a