khordehriz.com
Open in
urlscan Pro
167.235.1.52
Malicious Activity!
Public Scan
Effective URL: https://khordehriz.com/Strt/
Submission: On March 21 via manual from NL — Scanned from NL
Summary
TLS certificate: Issued by R3 on February 26th 2024. Valid for: 3 months.
This is the only time khordehriz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: NL Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 167.235.1.52 167.235.1.52 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 1 | 193.191.245.121 193.191.245.121 | 2611 (BELNET) (BELNET) | |
3 4 | 2a01:690:35:1... 2a01:690:35:100::f5:79 | 16326 (SMALS-MVM) (SMALS-MVM) | |
7 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
khordehriz.com
1 redirects
khordehriz.com |
165 KB |
2 |
werkenvoor.be
1 redirects
werkenvoor.be |
834 B |
2 |
workingfor.be
2 redirects
workingfor.be |
955 B |
1 |
selor.be
1 redirects
client.selor.be |
303 B |
7 | 4 |
Domain | Requested by | |
---|---|---|
7 | khordehriz.com |
1 redirects
khordehriz.com
|
2 | werkenvoor.be |
1 redirects
khordehriz.com
|
2 | workingfor.be | 2 redirects |
1 | client.selor.be | 1 redirects |
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
khordehriz.com R3 |
2024-02-26 - 2024-05-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://khordehriz.com/Strt/
Frame ID: 6B7FD1F8FA46CE9D990938B5131B96E4
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
BelastingdienstPage URL History Show full URLs
-
http://khordehriz.com/Strt/
HTTP 301
https://khordehriz.com/Strt/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://khordehriz.com/Strt/
HTTP 301
https://khordehriz.com/Strt/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 2- https://client.selor.be/img/federale_overheid_logo.png HTTP 301
- https://workingfor.be/language_selection_page HTTP 301
- https://workingfor.be/nl/language_selection_page HTTP 301
- https://werkenvoor.be/nl/language_selection_page HTTP 302
- https://werkenvoor.be/nl
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
khordehriz.com/Strt/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
khordehriz.com/Strt/files/ |
83 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
khordehriz.com/Strt/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nl
werkenvoor.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ROsanswebtextregular-54039c085acfdaf5124e55514d4153752a8526dc55b1d76c3bc731bfa4c3863a.woff
khordehriz.com/Strt/files/ |
75 KB 75 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ROsanswebtextbold-27c094142b294677babfd410f01ab0ef6450c30f0ced804477f1b98adfc3a591.woff
khordehriz.com/Strt/files/ |
68 KB 68 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icons-650b3ba27798de4eaf8cfc95c3ef953beff6658da3a4cfc5762c77eeb050a630.woff2
khordehriz.com/Strt/files/ |
3 KB 3 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: NL Government (Government)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| yesnoCheck2 function| yesnoCheck1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
khordehriz.com/ | Name: PHPSESSID Value: 27bd4a9a2bd51820baf27484e576652b |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
client.selor.be
khordehriz.com
werkenvoor.be
workingfor.be
167.235.1.52
193.191.245.121
2a01:690:35:100::f5:79
02d97b960834a53b85231d5e0eaec2458a999495a6d52f60515f41ac1b552ad3
27c094142b294677babfd410f01ab0ef6450c30f0ced804477f1b98adfc3a591
54039c085acfdaf5124e55514d4153752a8526dc55b1d76c3bc731bfa4c3863a
629fb0c4df844710f5ed3d2f807ac4fac53631a888d3368e8df44d5ed47589fb
650b3ba27798de4eaf8cfc95c3ef953beff6658da3a4cfc5762c77eeb050a630
87fb9c3207fdfcc161f73fe9be582e9ed7860e39fd99cffb416612827db88dbd
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855