diamond.com.pk
Open in
urlscan Pro
199.79.62.243
Malicious Activity!
Public Scan
Effective URL: https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/login.php?code=SE&id=ee9572a7581bd6ce4b0baec27de9f21...
Submission: On July 23 via manual from NO
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 20th 2020. Valid for: 3 months.
This is the only time diamond.com.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 185.162.171.236 185.162.171.236 | 60458 (ASN-XTUDI...) (ASN-XTUDIONET) | |
3 10 | 199.79.62.243 199.79.62.243 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY) | |
1 | 2a00:86c0:209... 2a00:86c0:2091::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
8 | 2 |
ASN60458 (ASN-XTUDIONET, ES)
PTR: s9.gestiondeservidor.com
latierracolabora.com |
ASN394695 (PUBLIC-DOMAIN-REGISTRY, US)
PTR: bh-27.webhostbox.net
diamond.com.pk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
diamond.com.pk
3 redirects
diamond.com.pk |
141 KB |
2 |
latierracolabora.com
2 redirects
latierracolabora.com |
341 B |
1 |
nflxext.com
assets.nflxext.com |
78 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
10 | diamond.com.pk |
3 redirects
diamond.com.pk
|
2 | latierracolabora.com | 2 redirects |
1 | assets.nflxext.com | |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mail.diamond.com.pk Let's Encrypt Authority X3 |
2020-06-20 - 2020-09-18 |
3 months | crt.sh |
*.1.nflxso.net DigiCert SHA2 Secure Server CA |
2020-06-27 - 2020-08-01 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/login.php?code=SE&id=ee9572a7581bd6ce4b0baec27de9f213&country=Sweden
Frame ID: 493FBFD09D273F75161716C788C35627
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://latierracolabora.com/wp-content/uploads/2013/.jisk
HTTP 301
https://latierracolabora.com/wp-content/uploads/2013/.jisk/ HTTP 302
https://diamond.com.pk/bbb HTTP 301
https://diamond.com.pk/bbb/ HTTP 302
https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865 HTTP 301
https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/ Page URL
- https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/login.php?code=SE&id=ee9572a7581... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://latierracolabora.com/wp-content/uploads/2013/.jisk
HTTP 301
https://latierracolabora.com/wp-content/uploads/2013/.jisk/ HTTP 302
https://diamond.com.pk/bbb HTTP 301
https://diamond.com.pk/bbb/ HTTP 302
https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865 HTTP 301
https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/ Page URL
- https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/login.php?code=SE&id=ee9572a7581bd6ce4b0baec27de9f213&country=Sweden Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://latierracolabora.com/wp-content/uploads/2013/.jisk HTTP 301
- https://latierracolabora.com/wp-content/uploads/2013/.jisk/ HTTP 302
- https://diamond.com.pk/bbb HTTP 301
- https://diamond.com.pk/bbb/ HTTP 302
- https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865 HTTP 301
- https://diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/ Redirect Chain
|
263 B 433 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
diamond.com.pk/bbb/prv/27cd640fe96948b41037efe06148c58b865/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
HF_D.css
diamond.com.pk/bbb/files/doc/css/ |
35 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
HF_A.css
diamond.com.pk/bbb/files/doc/css/ |
49 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
diamond.com.pk/bbb/files/doc/img/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.png
diamond.com.pk/bbb/files/doc/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.jpg
diamond.com.pk/bbb/files/doc/img/ |
84 KB 85 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-80.woff
assets.nflxext.com/ffe/siteui/fonts/ |
78 KB 78 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
diamond.com.pk/ | Name: PHPSESSID Value: 5ms5710m990oe93e0nk5a7eiq3 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
diamond.com.pk
latierracolabora.com
185.162.171.236
199.79.62.243
2a00:86c0:2091::1
2555364bdd6374d0c273c69322f2f78554c02fe630ee6582eeb2d2c9031d1a9d
31a7e24c493ca43563c641db5d9f29b763e60104097b83d2d665fc6e2525f32d
3e49d9dc43267590184389ab3da0cb9f7308c9c848667dab109a0f7c73450ece
46279f4f5c8950e379936d18d37c1af6d60eea37b7aa7d9f6a68a7322411c34b
5ca1d69131e90faf2776f62cf4d60540f3019e4ca30aec64e71418e63b56c271
baafd74a4cb4dc594b614eeb45c7267bb1af729d9271752460348ece16532d04
dd9b1c21a5e16ea328ffc4235d991babadf03be991ac4f7dbb11aac89966fcca
ecd28273fe2d6b48528e92a13a1c57504a0441f26310c4cc8d5ad054dddd35a2