megsmalloy.com
Open in
urlscan Pro
164.52.146.18
Malicious Activity!
Public Scan
Submission: On February 26 via manual from IT — Scanned from IT
Summary
This is the only time megsmalloy.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: CheBanca! (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 164.52.146.18 164.52.146.18 | 7226 (ZCOLO-ATL01) (ZCOLO-ATL01) | |
10 | 1 |
ASN7226 (ZCOLO-ATL01, US)
PTR: ez26.ez-web-hosting.com
megsmalloy.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
megsmalloy.com
megsmalloy.com |
1 MB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | megsmalloy.com |
megsmalloy.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://megsmalloy.com/
Frame ID: 23DCAA38BADDE2D98B5277C7FF945251
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
megsmalloy.com/ |
71 KB 72 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.min.3177882b91f1f9a1.css
megsmalloy.com/Accesso%20Clienti_files/ |
584 KB 585 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
megsmalloy.com/Accesso%20Clienti_files/ |
91 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite.1611833475219.png
megsmalloy.com/img/login-page/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GT-America-Light.woff2
megsmalloy.com/fonts/ |
71 KB 72 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GT-America-Medium.woff2
megsmalloy.com/fonts/ |
71 KB 72 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GT-America-Light.woff
megsmalloy.com/fonts/ |
71 KB 72 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GT-America-Medium.woff
megsmalloy.com/fonts/ |
71 KB 72 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GT-America-Light.ttf
megsmalloy.com/fonts/ |
71 KB 72 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GT-America-Medium.ttf
megsmalloy.com/fonts/ |
71 KB 72 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: CheBanca! (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
megsmalloy.com/fonts | Name: COOKIE_KEY Value: 164584797985 |
|
megsmalloy.com/ | Name: COOKIE_KEY Value: 164584797721 |
12 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
megsmalloy.com
164.52.146.18
42dd197f5d15d2a06539ab87fb97e1d3e1c40583deee00b6899a68981f0e33fa
ab4beb10a98c6594f9decdd9f590e60176a3de87bc2e62e9c7766ce90ee41606
dc324694ef22ef110916eb911e982ee03007022e98108b0bbdd0417e9dfc0546
fab6d70c15ea41eae978234d1b7ee9f1b0a67a5d7495adf639ac73f49aab8b05