![](/screenshots/a0c82b4a-6c97-4f90-9b39-607bf66a0410.png)
www.dwarkaexpresswaynewproject.in
Open in
urlscan Pro
2606:4700:3037::6812:329a
Malicious Activity!
Public Scan
Effective URL: https://www.dwarkaexpresswaynewproject.in/xender/8t386ee8kxb6472yif950xor.php?email=ruel.mangaliman@us.qbe.com&AD39L01592503636f65963743d5...
Submission: On June 18 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on October 27th 2019. Valid for: a year.
This is the only time www.dwarkaexpresswaynewproject.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
2 4 | 2606:4700:303... 2606:4700:3037::6812:329a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u17063293.ct.sendgrid.net |
ASN13335 (CLOUDFLARENET, US)
www.dwarkaexpresswaynewproject.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
dwarkaexpresswaynewproject.in
2 redirects
www.dwarkaexpresswaynewproject.in |
371 KB |
1 |
sendgrid.net
1 redirects
u17063293.ct.sendgrid.net |
285 B |
2 | 2 |
Domain | Requested by | |
---|---|---|
4 | www.dwarkaexpresswaynewproject.in |
2 redirects
www.dwarkaexpresswaynewproject.in
|
1 | u17063293.ct.sendgrid.net | 1 redirects |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-10-27 - 2020-10-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.dwarkaexpresswaynewproject.in/xender/8t386ee8kxb6472yif950xor.php?email=ruel.mangaliman@us.qbe.com&AD39L01592503636f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8&AP___=&error=
Frame ID: 0854A9970C6392B106A7477FD4415EAA
Requests: 4 HTTP requests in this frame
Screenshot
![](/screenshots/a0c82b4a-6c97-4f90-9b39-607bf66a0410.png)
Page URL History Show full URLs
-
https://u17063293.ct.sendgrid.net/ls/click?upn=gFHZeFsNSjbwCBITMzSEEBVYBtzXLvOmm1YDyCAZZxfZWnzQSHtmHhkX2r1U2oJ...
HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender?email=ruel.mangaliman@us.qbe.com HTTP 301
https://www.dwarkaexpresswaynewproject.in/xender/?email=ruel.mangaliman@us.qbe.com HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender/8t386ee8kxb6472yif950xor.php?email=ruel.mangaliman@us.qbe.com&AD39L01... Page URL
Detected technologies
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u17063293.ct.sendgrid.net/ls/click?upn=gFHZeFsNSjbwCBITMzSEEBVYBtzXLvOmm1YDyCAZZxfZWnzQSHtmHhkX2r1U2oJkzRO9wFfeFt2FP5JP5CzNpsiSR01-2F1uGbdIrjcQqFGfzeriQ5iSd95BiJ3u0bZIYIXrxM_GJ-2B0ElDkfpgwJF-2F71B-2FCjudlNpa2ZkcijDknBcw57AQNYiO1X-2B-2BNKQyaovzU3D-2Bce8u9sPERtcEphS444f0LDr38cbpZuwIwn4d8-2BnwYsFyU7lw-2FAB15QAStY6XgSHXzfqqkwZQAN3h2smlC-2FHEDdv66QpnBMCGMai-2BZhRBHH8uqBwcyYh-2FsBetkHjwic-2B7tMEC0Nto8aoPRvuC89Z1ADw-3D-3D
HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender?email=ruel.mangaliman@us.qbe.com HTTP 301
https://www.dwarkaexpresswaynewproject.in/xender/?email=ruel.mangaliman@us.qbe.com HTTP 302
https://www.dwarkaexpresswaynewproject.in/xender/8t386ee8kxb6472yif950xor.php?email=ruel.mangaliman@us.qbe.com&AD39L01592503636f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8f65963743d5060730789a55f1bb08ec8&AP___=&error= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
8t386ee8kxb6472yif950xor.php
www.dwarkaexpresswaynewproject.in/xender/ Redirect Chain
|
478 KB 354 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
273 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Product.ttf
www.dwarkaexpresswaynewproject.in/xender/ |
40 KB 17 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.dwarkaexpresswaynewproject.in/ | Name: __cfduid Value: d0a5bef07e8771e2fb3b883e8f26c2ef31592503637 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
u17063293.ct.sendgrid.net
www.dwarkaexpresswaynewproject.in
167.89.123.16
2606:4700:3037::6812:329a
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f
b34cbb71d75b84eb4925f51e050249f65fb3e3550133aba0a4c161c6820aec82
e166efe12f0033e2a9e3339cdeaa31beb4edecc489be513fd95877868e65cca4
e56c08a0c1dd7f46f71c5778ae041592f74b0c1444b53c60a252a4e3da02a1ed