![](/screenshots/c54c6580-a8b3-4e52-8f99-23cc1f131ed0.png)
www.dwarkaexpresswaynewproject.in
Open in
urlscan Pro
2606:4700:3037::6812:329a
Malicious Activity!
Public Scan
Effective URL: https://www.dwarkaexpresswaynewproject.in/font/usrjlxdevfd09cv9yprttee6.php?email=t.smit@eib.org&i3Hei11592221288fa3572d7647648867091ba66b...
Submission: On June 15 via manual from LU
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on October 27th 2019. Valid for: a year.
This is the only time www.dwarkaexpresswaynewproject.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
2 4 | 2606:4700:303... 2606:4700:3037::6812:329a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u16930893.ct.sendgrid.net |
ASN13335 (CLOUDFLARENET, US)
www.dwarkaexpresswaynewproject.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
dwarkaexpresswaynewproject.in
2 redirects
www.dwarkaexpresswaynewproject.in |
371 KB |
1 |
sendgrid.net
1 redirects
u16930893.ct.sendgrid.net |
270 B |
2 | 2 |
Domain | Requested by | |
---|---|---|
4 | www.dwarkaexpresswaynewproject.in |
2 redirects
www.dwarkaexpresswaynewproject.in
|
1 | u16930893.ct.sendgrid.net | 1 redirects |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-10-27 - 2020-10-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.dwarkaexpresswaynewproject.in/font/usrjlxdevfd09cv9yprttee6.php?email=t.smit@eib.org&i3Hei11592221288fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576&AP___=&error=
Frame ID: 5BC586C0932EB41DEDB40915D34899F0
Requests: 4 HTTP requests in this frame
Screenshot
![](/screenshots/c54c6580-a8b3-4e52-8f99-23cc1f131ed0.png)
Page URL History Show full URLs
-
http://u16930893.ct.sendgrid.net/ls/click?upn=2CSeUvT-2FeEsxZ8Sc3R71aZ-2ButZ4j38aVgoyJHtTt70Ve-2F3IMjtcX8qNtX...
HTTP 302
https://www.dwarkaexpresswaynewproject.in/font?email=t.smit@eib.org HTTP 301
https://www.dwarkaexpresswaynewproject.in/font/?email=t.smit@eib.org HTTP 302
https://www.dwarkaexpresswaynewproject.in/font/usrjlxdevfd09cv9yprttee6.php?email=t.smit@eib.org&i3Hei11592221288fa357... Page URL
Detected technologies
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u16930893.ct.sendgrid.net/ls/click?upn=2CSeUvT-2FeEsxZ8Sc3R71aZ-2ButZ4j38aVgoyJHtTt70Ve-2F3IMjtcX8qNtXf5fayb3-2FzA1oTjSWusG7FI3GYrnm-2FoIe30VaIxb4x-2FTUQsr27Q-3DQHOP_USSm-2BeeJPMm7ow-2BBhj4KtLBcqd-2Bqc3GWbhnIuytoSp2hEGpjQaQ7b7A7fL7VB4ieOSG0Y5Rl-2BYKNntDVKsUAk8wJJ7eFPpuCRnBsmGxSDRg0NtKDlprfQ6ERexU5LfthFrXpcwxxu0FDPIhDQ1qJOEwwpiZmHrLMTtLk1IJJURuxLnQdBIHbPK-2B0cxR8lFB0N-2BfQvFwXW2WLMWkS62rEAQ-3D-3D
HTTP 302
https://www.dwarkaexpresswaynewproject.in/font?email=t.smit@eib.org HTTP 301
https://www.dwarkaexpresswaynewproject.in/font/?email=t.smit@eib.org HTTP 302
https://www.dwarkaexpresswaynewproject.in/font/usrjlxdevfd09cv9yprttee6.php?email=t.smit@eib.org&i3Hei11592221288fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576fa3572d7647648867091ba66b93b2576&AP___=&error= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
usrjlxdevfd09cv9yprttee6.php
www.dwarkaexpresswaynewproject.in/font/ Redirect Chain
|
478 KB 354 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
273 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Product.ttf
www.dwarkaexpresswaynewproject.in/font/ |
40 KB 17 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.dwarkaexpresswaynewproject.in/ | Name: __cfduid Value: d61b80cdbad3b7529926a1f6b2ee438091592221289 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
u16930893.ct.sendgrid.net
www.dwarkaexpresswaynewproject.in
167.89.123.16
2606:4700:3037::6812:329a
04473150e45f39d3536ff30dd438b7a5abd28544679cb5f96c4fa2233bd19680
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f
b34cbb71d75b84eb4925f51e050249f65fb3e3550133aba0a4c161c6820aec82
e166efe12f0033e2a9e3339cdeaa31beb4edecc489be513fd95877868e65cca4