www.univ-alger.dz
Open in
urlscan Pro
193.194.83.126
Malicious Activity!
Public Scan
Submission: On April 13 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 16th 2020. Valid for: 3 months.
This is the only time www.univ-alger.dz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 193.194.83.126 193.194.83.126 | 3208 (ARN) (ARN) | |
15 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
univ-alger.dz
www.univ-alger.dz |
148 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | www.univ-alger.dz |
www.univ-alger.dz
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
netflix.com.br |
www.verisign.com |
help.netflix.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.univ-alger.dz Let's Encrypt Authority X3 |
2020-03-16 - 2020-06-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.univ-alger.dz/cgi/atualizar/cadastronetflix/
Frame ID: 6CA2D6E7469EC9B9C9B8E2E38794E2FE
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Sair
Search URL Search Domain Scan URL
Title: CONFIANÇA EM TRANSAÇÕES ONLINE
Search URL Search Domain Scan URL
Title: Termos de uso
Search URL Search Domain Scan URL
Title: Privacidade
Search URL Search Domain Scan URL
Title: Preferências de cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.univ-alger.dz/cgi/atualizar/cadastronetflix/ |
11 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
netflix.css
www.univ-alger.dz/cgi/atualizar/cadastronetflix/css/ |
98 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.1.min.js
www.univ-alger.dz/cgi/atualizar/cadastronetflix/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.min.js
www.univ-alger.dz/cgi/atualizar/cadastronetflix/js/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
validation.js
www.univ-alger.dz/cgi/atualizar/cadastronetflix/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
question_mark.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
564 B 832 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
getseal.gif
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clear.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
81 B 347 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
carrot_sprite_16x33.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
12_11_2014_icon_visa_37x25.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
10_18_2014_icon_master_37x25.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
10_18_2014_icon_amex_37x25.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
elo.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_DinersClub_37x25.png
www.univ-alger.dz/cgi/atualizar/cadastronetflix/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-80.woff
www.univ-alger.dz/cgi/atualizar/cadastronetflix/font/ |
78 KB 78 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online) Generic (Online)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| validarCPF function| remove function| mascara function| execmascara function| cpf_mask function| soNumeros function| soLetras function| checkCard function| check_cadastro0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.univ-alger.dz
193.194.83.126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