www.alwatan.com.bd
Open in
urlscan Pro
103.19.255.244
Malicious Activity!
Public Scan
Submission: On June 26 via automatic, source openphish
Summary
This is the only time www.alwatan.com.bd was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 103.19.255.244 103.19.255.244 | 135092 (DHAKATECH...) (DHAKATECH-AS-AP Ashraf Uddin t/a Dhaka tech) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
3 | 2a04:4e42:3::621 2a04:4e42:3::621 | 54113 (FASTLY) (FASTLY) | |
1 | 2a00:1450:400... 2a00:1450:4001:806::2001 | 15169 (GOOGLE) (GOOGLE) | |
6 | 4 |
ASN135092 (DHAKATECH-AS-AP Ashraf Uddin t/a Dhaka tech, BD)
PTR: server.digitalsynapsebd.com
www.alwatan.com.bd |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
jsdelivr.net
cdn.jsdelivr.net |
14 KB |
1 |
blogspot.com
1.bp.blogspot.com |
3 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
alwatan.com.bd
www.alwatan.com.bd |
592 KB |
6 | 4 |
Domain | Requested by | |
---|---|---|
3 | cdn.jsdelivr.net |
www.alwatan.com.bd
|
1 | 1.bp.blogspot.com |
www.alwatan.com.bd
|
1 | code.jquery.com |
www.alwatan.com.bd
|
1 | www.alwatan.com.bd | |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
f3.shared.global.fastly.net GlobalSign CloudSSL CA - SHA256 - G3 |
2020-06-08 - 2021-04-17 |
10 months | crt.sh |
*.googleusercontent.com GTS CA 1O1 |
2020-06-10 - 2020-09-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.alwatan.com.bd/indexfiles.php
Frame ID: ACEAB80F8CB3EAE7234E08F9BA6A1692
Requests: 6 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- http://cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/alertify.min.js HTTP 307
- https://cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/alertify.min.js
- http://cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/css/alertify.min.css HTTP 307
- https://cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/css/alertify.min.css
- http://cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/css/themes/default.min.css HTTP 307
- https://cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/css/themes/default.min.css
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
indexfiles.php
www.alwatan.com.bd/ |
591 KB 592 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.min.js
code.jquery.com/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alertify.min.js
cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/ Redirect Chain
|
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alertify.min.css
cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/css/ Redirect Chain
|
20 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.min.css
cdn.jsdelivr.net/npm/alertifyjs@1.12.0/build/css/themes/ Redirect Chain
|
2 KB 719 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email-client-app-logo.png
1.bp.blogspot.com/-vNe7oclJDjs/Xa3BYPD_4bI/AAAAAAAAA1A/iVLrECXRfFICY9MsHWl4UpvvPQHmjjttACLcBGAsYHQ/s1600/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| alertify0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1.bp.blogspot.com
cdn.jsdelivr.net
code.jquery.com
www.alwatan.com.bd
103.19.255.244
2001:4de0:ac19::1:b:1b
2a00:1450:4001:806::2001
2a04:4e42:3::621
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
6e2c64daf7488c12a49db84794fd237fbeef39a17c7ef1536a291b72f92676c6
77e5ad291208eaac2cf688eef1d728ff72ba712457ecd0408d2b86d89a2434f3
9e1b2d8030ae64641193ec2fc176483eddbbf1aac7b6e64a275610d2bad788be
cac708660b650d1f6ae9ea1809199c6a2344e96f345054a7abee8b970bb834b2
fc948399ae4a387cee99364921085d8f8525ac022dd0d1fe8420e615a0c351ce