www.royalmail.id
Open in
urlscan Pro
162.0.209.192
Malicious Activity!
Public Scan
Submission: On March 04 via automatic, source openphish
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on March 1st 2021. Valid for: a year.
This is the only time www.royalmail.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Royal Mail (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 162.0.209.192 162.0.209.192 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
2 | 23.32.238.209 23.32.238.209 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
14 | 3 |
ASN22612 (NAMECHEAP-NET, US)
PTR: business126-2.web-hosting.com
www.royalmail.id |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-32-238-209.deploy.static.akamaitechnologies.com
www.royalmail.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
royalmail.id
www.royalmail.id |
82 KB |
2 |
royalmail.com
www.royalmail.com Failed |
945 B |
14 | 2 |
Domain | Requested by | |
---|---|---|
6 | www.royalmail.id |
www.royalmail.id
|
2 | www.royalmail.com |
www.royalmail.id
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
royalmail.id Sectigo RSA Domain Validation Secure Server CA |
2021-03-01 - 2022-03-01 |
a year | crt.sh |
*.royalmail.com Entrust Certification Authority - L1K |
2020-09-25 - 2021-10-24 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.royalmail.id/online/your-details.php
Frame ID: 2F1231A9C024CF52CD70BF5E80B8D30E
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
Drupal (CMS) ExpandDetected patterns
- meta generator /^Drupal(?:\s([\d.]+))?/i
PHP (Programming Languages) Expand
Detected patterns
- url /\.php(?:$|\?)/i
- meta generator /^Drupal(?:\s([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
your-details.php
www.royalmail.id/online/ |
23 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_2kSODmeFaX7ybMB6AeohAt_hNxiz95dKI0JJ2-F4f_k.css
www.royalmail.id/online/royal/ |
27 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_w-rueMIDc5VsBMc9Q_W3R1vWBKMej67QaMzdxjOuGdE.css
www.royalmail.id/online/royal/ |
445 KB 57 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.minacee.js
www.royalmail.id/online/royal/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
www.royalmail.id/online/royal/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
chevin-medium.woff
www.royalmail.com/themes/custom/rmlcwr/fonts/chevin/chevin-medium/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
search-white.svg
www.royalmail.com/themes/custom/rmlcwr/icons_fill/ |
289 B 505 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chevron-down.svg
www.royalmail.com/themes/custom/rmlcwr/icons_fill/ |
179 B 440 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rml-textured-background.png
www.royalmail.id/themes/custom/rmlcwr/textures/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
pfdintextstd-bold-webfont.woff
www.royalmail.com/themes/custom/rmlcwr/fonts/pf-din-text-std/pf-din-text-std-bold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
chevin-bold.woff
www.royalmail.com/themes/custom/rmlcwr/fonts/chevin/chevin-bold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
chevin-medium.ttf
www.royalmail.com/themes/custom/rmlcwr/fonts/chevin-medium/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
pfdintextstd-bold-webfont.ttf
www.royalmail.com/themes/custom/rmlcwr/fonts/pf-din-text-std/pf-din-text-std-bold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
chevin-bold.ttf
www.royalmail.com/themes/custom/rmlcwr/fonts/chevin/chevin-bold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.royalmail.com
- URL
- https://www.royalmail.com/themes/custom/rmlcwr/fonts/chevin/chevin-medium/chevin-medium.woff
- Domain
- www.royalmail.com
- URL
- https://www.royalmail.com/themes/custom/rmlcwr/fonts/pf-din-text-std/pf-din-text-std-bold/pfdintextstd-bold-webfont.woff
- Domain
- www.royalmail.com
- URL
- https://www.royalmail.com/themes/custom/rmlcwr/fonts/chevin/chevin-bold/chevin-bold.woff
- Domain
- www.royalmail.com
- URL
- https://www.royalmail.com/themes/custom/rmlcwr/fonts/chevin-medium/chevin-medium.ttf
- Domain
- www.royalmail.com
- URL
- https://www.royalmail.com/themes/custom/rmlcwr/fonts/pf-din-text-std/pf-din-text-std-bold/pfdintextstd-bold-webfont.ttf
- Domain
- www.royalmail.com
- URL
- https://www.royalmail.com/themes/custom/rmlcwr/fonts/chevin/chevin-bold/chevin-bold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Royal Mail (Government)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| Modernizr function| validateForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload; |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.royalmail.com
www.royalmail.id
www.royalmail.com
162.0.209.192
23.32.238.209
1e06b3b8ed8d91022c8192923eb0d0a913596d088312b8bdc0c3b6dd2361627a
344b29deab56ac203aa9d4c258a097020f4b207da082f1267e2b9a4280903c34
4b347d04c14eba39fd227520c747ea36e702a5c540593a0a78d23da1c4e0f589
51e0af0ef371a2295c8cf115b147bc14d729106bec94d4063463f15040720614
71cb53f1b16ab6c4c7ce4439edccc605d614adda8f883cef731033b4bc62b4a7
bd3fb74304196de3e92ea2b5027861ea72fe89e10c5e71e86e56b4f6fd233ae4
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
e88822074f2a38c08df45bbf44265d3e41e64d2282ca416a8909d18c27d5f30f