bojongmangu.bekasikab.go.id
Open in
urlscan Pro
103.105.197.236
Malicious Activity!
Public Scan
Effective URL: https://bojongmangu.bekasikab.go.id/logo/1/indexfr.php
Submission: On November 28 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by RapidSSL TLS RSA CA G1 on June 20th 2022. Valid for: a year.
This is the only time bojongmangu.bekasikab.go.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 103.105.197.236 103.105.197.236 | 137287 (IDNIC-PEM...) (IDNIC-PEMDAKAB-BEKASI-AS-ID DINAS KOMUNIKASI DAN INFORMATIKA KAB. BEKASI) | |
2 | 103.134.152.4 103.134.152.4 | 138608 (CLOUDHOST...) (CLOUDHOST-AS-AP Cloud Host Pte Ltd) | |
4 | 2 |
ASN137287 (IDNIC-PEMDAKAB-BEKASI-AS-ID DINAS KOMUNIKASI DAN INFORMATIKA KAB. BEKASI, ID)
PTR: dev-epers.bekasikab.go.id
bojongmangu.bekasikab.go.id |
ASN138608 (CLOUDHOST-AS-AP Cloud Host Pte Ltd, SG)
PTR: sgz11.cloudhost.id
digitaldatabase.my.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
bekasikab.go.id
1 redirects
bojongmangu.bekasikab.go.id |
3 KB |
2 |
digitaldatabase.my.id
digitaldatabase.my.id |
936 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
3 | bojongmangu.bekasikab.go.id |
1 redirects
bojongmangu.bekasikab.go.id
|
2 | digitaldatabase.my.id |
bojongmangu.bekasikab.go.id
|
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bekasikab.go.id RapidSSL TLS RSA CA G1 |
2022-06-20 - 2023-06-19 |
a year | crt.sh |
digitaldatabase.my.id R3 |
2022-10-10 - 2023-01-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bojongmangu.bekasikab.go.id/logo/1/indexfr.php
Frame ID: 750121DA47C3254290A7E4B0D50372BF
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Fichier envoyé àPage URL History Show full URLs
-
http://bojongmangu.bekasikab.go.id/logo/1/indexfr.php
HTTP 302
https://bojongmangu.bekasikab.go.id/logo/1/indexfr.php Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
PHP (Programming Languages) Expand
Detected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bojongmangu.bekasikab.go.id/logo/1/indexfr.php
HTTP 302
https://bojongmangu.bekasikab.go.id/logo/1/indexfr.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
indexfr.php
bojongmangu.bekasikab.go.id/logo/1/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wt.png
digitaldatabase.my.id/wp-content/uploads/2022/10/ |
125 KB 126 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
bojongmangu.bekasikab.go.id/logo/1/assets/bootstrap/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg7.png
digitaldatabase.my.id/wp-content/uploads/2022/10/ |
810 KB 811 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bojongmangu.bekasikab.go.id
digitaldatabase.my.id
103.105.197.236
103.134.152.4
261977680e491a2076cbb337ca62bf4d357e959c4d4b33b99f30641e0fe69460
a30d676d5acc7fda0731bf303702f835b002253e12328254da85f286784fad68
baac93855451e14898a6b5aaf78da07ffa9b61bb4d75c3a5353b18bb6660eab5