![](/screenshots/78b43737-3f60-4cb2-871f-7d00de389830.png)
dhlvodafone.increso.it
Open in
urlscan Pro
35.152.42.148
Malicious Activity!
Public Scan
Effective URL: https://dhlvodafone.increso.it/_/app?f=64d9d1c2ea01ec0018163957&t=GYROfaKEfy
Submission: On August 15 via automatic, source openphish — Scanned from IT
Summary
TLS certificate: Issued by R3 on June 22nd 2023. Valid for: 3 months.
This is the only time dhlvodafone.increso.it was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 35.152.42.148 35.152.42.148 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 142.250.186.106 142.250.186.106 | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.70.95.247 104.70.95.247 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 172.217.18.3 172.217.18.3 | 15169 (GOOGLE) (GOOGLE) | |
9 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-35-152-42-148.eu-south-1.compute.amazonaws.com
dhlvodafone.increso.it |
ASN15169 (GOOGLE, US)
PTR: fra24s06-in-f10.1e100.net
fonts.googleapis.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-70-95-247.deploy.static.akamaitechnologies.com
www.dhl.com |
ASN15169 (GOOGLE, US)
PTR: fra15s28-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
increso.it
1 redirects
dhlvodafone.increso.it |
468 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 245 |
118 KB |
1 |
gstatic.com
fonts.gstatic.com |
24 KB |
1 |
dhl.com
www.dhl.com — Cisco Umbrella Rank: 40496 |
1 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 67 |
886 B |
9 | 5 |
Domain | Requested by | |
---|---|---|
5 | dhlvodafone.increso.it |
1 redirects
dhlvodafone.increso.it
|
2 | cdnjs.cloudflare.com |
dhlvodafone.increso.it
cdnjs.cloudflare.com |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | www.dhl.com | |
1 | fonts.googleapis.com |
cdnjs.cloudflare.com
|
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dhlvodafone.increso.it R3 |
2023-06-22 - 2023-09-20 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-07-17 - 2023-10-09 |
3 months | crt.sh |
www.dhl.com DPDHL Global TLS CA - I5 |
2023-07-31 - 2024-07-30 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-07-17 - 2023-10-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dhlvodafone.increso.it/_/app?f=64d9d1c2ea01ec0018163957&t=GYROfaKEfy
Frame ID: 464323E14C209C3C5B8F2E2BA63EEADF
Requests: 9 HTTP requests in this frame
Screenshot
![](/screenshots/78b43737-3f60-4cb2-871f-7d00de389830.png)
Page Title
DHL PWAPage URL History Show full URLs
-
https://dhlvodafone.increso.it/WAbsWSR7
HTTP 302
https://dhlvodafone.increso.it/_/app?f=64d9d1c2ea01ec0018163957&t=GYROfaKEfy Page URL
Detected technologies
![](/vendor/wappa/icons/Semantic-ui.png)
Detected patterns
- <link[^>]+semantic(?:\.min)\.css"
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://dhlvodafone.increso.it/WAbsWSR7
HTTP 302
https://dhlvodafone.increso.it/_/app?f=64d9d1c2ea01ec0018163957&t=GYROfaKEfy Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
app
dhlvodafone.increso.it/_/ Redirect Chain
|
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
semantic.min.css
cdnjs.cloudflare.com/ajax/libs/semantic-ui/2.4.1/ |
614 KB 78 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.4cd9805a.js
dhlvodafone.increso.it/_/app/static/js/ |
464 KB 465 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.42b1a9f8.css
dhlvodafone.increso.it/_/app/static/css/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 886 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
auth
dhlvodafone.increso.it/api/vfac/app/ |
36 B 213 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dhl-logo.svg
www.dhl.com/content/dam/dhl/global/core/images/logos/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icons.woff2
cdnjs.cloudflare.com/ajax/libs/semantic-ui/2.4.1/themes/default/assets/fonts/ |
39 KB 40 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v24/ |
23 KB 24 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkinx_pwa_poc object| regeneratorRuntime0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15724800; includeSubDomains |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
dhlvodafone.increso.it
fonts.googleapis.com
fonts.gstatic.com
www.dhl.com
104.17.24.14
104.70.95.247
142.250.186.106
172.217.18.3
35.152.42.148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