uniquelynepali.ipower.com
Open in
urlscan Pro
66.96.130.11
Malicious Activity!
Public Scan
Effective URL: https://uniquelynepali.ipower.com/nzier/9732da19c39e98c/payment.php?payment
Submission: On August 28 via manual from NZ — Scanned from NZ
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 4th 2023. Valid for: a year.
This is the only time uniquelynepali.ipower.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: NZ Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 66.96.130.11 66.96.130.11 | 29873 (BIZLAND-SD) (BIZLAND-SD) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 151.101.2.227 151.101.2.227 | 54113 (FASTLY) (FASTLY) | |
1 | 2404:6800:400... 2404:6800:4003:c01::65 | 15169 (GOOGLE) (GOOGLE) | |
1 | 202.180.68.59 202.180.68.59 | 9790 (TWO-DEGRE...) (TWO-DEGREES-AS-AP Two Degrees Networks Limited) | |
1 | 185.125.86.33 185.125.86.33 | 134433 (REDSHIELD...) (REDSHIELD-AS-AP REDSHIELD SECURITY LIMITED) | |
11 | 6 |
ASN29873 (BIZLAND-SD, US)
PTR: 11.130.96.66.static.eigbox.net
uniquelynepali.ipower.com |
ASN9790 (TWO-DEGREES-AS-AP Two Degrees Networks Limited, NZ)
PTR: ip59.wxc.cust.commverge.net.nz
www.passtheparcel.co.nz |
ASN134433 (REDSHIELD-AS-AP REDSHIELD SECURITY LIMITED, NZ)
www.nzpost.co.nz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
ipower.com
1 redirects
uniquelynepali.ipower.com |
255 KB |
1 |
nzpost.co.nz
www.nzpost.co.nz — Cisco Umbrella Rank: 842222 |
4 KB |
1 |
passtheparcel.co.nz
www.passtheparcel.co.nz |
47 KB |
1 |
gstatic.com
encrypted-tbn0.gstatic.com |
4 KB |
1 |
stuff.co.nz
resources.stuff.co.nz — Cisco Umbrella Rank: 240301 |
43 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 231 |
3 KB |
11 | 6 |
Domain | Requested by | |
---|---|---|
7 | uniquelynepali.ipower.com |
1 redirects
uniquelynepali.ipower.com
|
1 | www.nzpost.co.nz |
uniquelynepali.ipower.com
|
1 | www.passtheparcel.co.nz |
uniquelynepali.ipower.com
|
1 | encrypted-tbn0.gstatic.com |
uniquelynepali.ipower.com
|
1 | resources.stuff.co.nz |
uniquelynepali.ipower.com
|
1 | cdnjs.cloudflare.com |
uniquelynepali.ipower.com
|
11 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.ipower.com Sectigo RSA Domain Validation Secure Server CA |
2023-01-04 - 2024-01-04 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.stuff.co.nz GlobalSign Atlas R3 OV TLS CA 2023 Q3 |
2023-08-21 - 2024-09-21 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
freightways.co.nz Sectigo RSA Domain Validation Secure Server CA |
2023-07-31 - 2024-08-08 |
a year | crt.sh |
www.nzpost.co.nz Thawte EV RSA CA G2 |
2023-06-27 - 2024-06-27 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://uniquelynepali.ipower.com/nzier/9732da19c39e98c/payment.php?payment
Frame ID: F84F51FB59DFCF6933260ED9D24E1779
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
ΝΖΡost PaymentPage URL History Show full URLs
-
https://uniquelynepali.ipower.com/nzier/
HTTP 302
https://uniquelynepali.ipower.com/nzier/9732da19c39e98c/payment.php?payment Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://uniquelynepali.ipower.com/nzier/
HTTP 302
https://uniquelynepali.ipower.com/nzier/9732da19c39e98c/payment.php?payment Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
payment.php
uniquelynepali.ipower.com/nzier/9732da19c39e98c/ Redirect Chain
|
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
uniquelynepali.ipower.com/nzier/assets/css/ |
124 KB 125 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
uniquelynepali.ipower.com/nzier/assets/css/ |
16 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.0.min.js
uniquelynepali.ipower.com/nzier/assets/js/ |
84 KB 85 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1624491905814.jpg
resources.stuff.co.nz/content/dam/images/4/y/t/c/4/y/image.related.StuffLandscapeSixteenByNine.1420x800.22qnap.png/ |
42 KB 43 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
images
encrypted-tbn0.gstatic.com/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
your_packaging.gif
www.passtheparcel.co.nz/images/products/ |
47 KB 47 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nzpost-logo-footer-k.svg
www.nzpost.co.nz/themes/custom/nzpost_kahuku/images/logos/ |
7 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cccc.png
uniquelynepali.ipower.com/nzier/assets/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
crypt.png
uniquelynepali.ipower.com/nzier/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: NZ Post (Transportation)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery function| type_carte function| handleExpInput1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
uniquelynepali.ipower.com/ | Name: PHPSESSID Value: ic3l9jvjdqn2tfpfcauqh32q6obp0f17 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
encrypted-tbn0.gstatic.com
resources.stuff.co.nz
uniquelynepali.ipower.com
www.nzpost.co.nz
www.passtheparcel.co.nz
151.101.2.227
185.125.86.33
202.180.68.59
2404:6800:4003:c01::65
2606:4700::6811:180e
66.96.130.11
0765413b99b96f59555266eda3e554a3d3bd9347d1f33f5230d4515fe73772ea
08b507ea7b907d8ac2c7517956313b6de36d5be0543f48d1bba0a59ad20965e9
3d13794f6b1098ddfc97de0f7a7e1efe6eaddbb6b6ac000fe742cd29fcb0b7be
702b9e051e82b32038ffdb33a4f7eb5f7b38f4cf6f514e4182d8898f4eb0b7fb
76dc0f524b990f1a1dcb4e8fe32c0deeb5a4cd2402877250e5f29936e643ef0d
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020
9e5acf9fd701e378bcc6e6a090998309f1c273a8d9d43c538229aa29a2baee91
bd8263afe82c75e56eaae9fc83a25e46267d1712874aa53e2443b93bc25f1d5c
c6fc8dcbd9126717ca5e8d792c6dcdf5d7aa4823b2a0445d14db1fad8d0a8f90
c942524cf7579ebbb4abb2e2912f6c080ff38db4e5a3895425a8f08bf05f105e
fdebe333f5f73f4d759428fec21474e9462ea493838710a102667b3ea9e3c298