ejournal.undiksha.ac.id
Open in
urlscan Pro
119.252.170.182
Malicious Activity!
Public Scan
Submission: On November 08 via automatic, source openphish
Summary
This is the only time ejournal.undiksha.ac.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: CapitalOne (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 119.252.170.182 119.252.170.182 | 9341 (ICONPLN-I...) (ICONPLN-ID-AP PT Indonesia Comnets Plus) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
2 | 2606:4700::68... 2606:4700::6810:5714 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
13 | 3 |
ASN9341 (ICONPLN-ID-AP PT Indonesia Comnets Plus, ID)
PTR: 182.170.iconpln.net.id
ejournal.undiksha.ac.id |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn.jsdelivr.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
undiksha.ac.id
ejournal.undiksha.ac.id |
128 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net |
13 KB |
1 |
jquery.com
code.jquery.com |
33 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
10 | ejournal.undiksha.ac.id |
ejournal.undiksha.ac.id
code.jquery.com |
2 | cdn.jsdelivr.net |
ejournal.undiksha.ac.id
|
1 | code.jquery.com |
ejournal.undiksha.ac.id
|
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
ssl363648.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-10-27 - 2019-05-05 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/step3.php?cmd=login_submit&id=&session=
Frame ID: 154B5F6FA47C20263B2E634D22090BC5
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
step3.php
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-3f627e3dc2.css
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/index_files/ |
115 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
capitalone-logo.png
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/index_files/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9.gif
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/images/ |
13 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8.gif
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/images/ |
14 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7.gif
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/images/ |
21 KB 21 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.1.min.js
code.jquery.com/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.validate.min.js
cdn.jsdelivr.net/jquery.validation/1.16.0/ |
23 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
additional-methods.min.js
cdn.jsdelivr.net/jquery.validation/1.16.0/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
drop-icon.png
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/images/ |
346 B 346 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNovaRegular.woff2
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNovaSemiBold.woff2
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/fonts/ |
20 KB 20 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNovaRegular.woff
ejournal.undiksha.ac.id/public/sym/root/tmp/CapitalOne/myacctz/fonts/ |
24 KB 24 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: CapitalOne (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| cc_number_saved function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
ejournal.undiksha.ac.id
119.252.170.182
205.185.208.52
2606:4700::6810:5714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