oferta-relampago.mx.nf
Open in
urlscan Pro
31.22.4.229
Malicious Activity!
Public Scan
Submission: On February 02 via automatic, source phishtank
Summary
This is the only time oferta-relampago.mx.nf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 31.22.4.229 31.22.4.229 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
1 | 2606:4700:10:... 2606:4700:10::6814:7138 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2 |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: sv61.ifastnet10.org
oferta-relampago.mx.nf |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
mx.nf
oferta-relampago.mx.nf |
44 KB |
1 |
tudocdn.net
t.tudocdn.net |
21 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | oferta-relampago.mx.nf |
oferta-relampago.mx.nf
|
1 | t.tudocdn.net |
oferta-relampago.mx.nf
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
tudocdn.net CloudFlare Inc ECC CA-2 |
2019-12-04 - 2020-10-09 |
10 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://oferta-relampago.mx.nf/acesso/beneficios/exclusivos/index.php
Frame ID: 1AA74D25C0650977C32AFB4F4F4436F8
Requests: 6 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
oferta-relampago.mx.nf/acesso/beneficios/exclusivos/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
oferta-relampago.mx.nf/acesso/beneficios/exclusivos/css/ |
187 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
estilo.css
oferta-relampago.mx.nf/acesso/beneficios/exclusivos/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
oferta-relampago.mx.nf/acesso/beneficios/exclusivos/img/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
oferta-relampago.mx.nf/acesso/beneficios/exclusivos/img/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
303043
t.tudocdn.net/ |
21 KB 21 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
oferta-relampago.mx.nf
t.tudocdn.net
2606:4700:10::6814:7138
31.22.4.229
50f8268464238421fcd69742cfbb6905e59d924383d56b42688f32a2597f1b4f
7c367ac076e6a1bef61fd77aa2adcfebf1771dcfb01c18dd8ba153b14bef423b
8ee10ab2db6b25c96db8f2784a722a0790d1d965d381a7dbc6da12a17310b9fc
a920c6a0f0a1c377349f894f8aa52878d2f5e84298a5c78b5cfcc07d88e84645
d4b4769a07ffdf6abde5fdf21469a4af6b55c194e81269855c7dd93a1c0237de
eba69553d369af1bd37662cd1a731dd4812c9e6c06ca9aafe78e96c761b1586a