www.blog.duino.lk
Open in
urlscan Pro
204.93.161.201
Malicious Activity!
Public Scan
Submission: On June 12 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 31st 2020. Valid for: 3 months.
This is the only time www.blog.duino.lk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Regions Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 204.93.161.201 204.93.161.201 | 23352 (SERVERCEN...) (SERVERCENTRAL) | |
1 | 205.255.100.240 205.255.100.240 | 19905 (NEUSTAR-AS6) (NEUSTAR-AS6) | |
7 | 3 |
ASN23352 (SERVERCENTRAL, US)
PTR: duino.lk
www.blog.duino.lk |
ASN19905 (NEUSTAR-AS6, US)
PTR: login.regions.com
login.regions.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
duino.lk
www.blog.duino.lk |
28 KB |
1 |
regions.com
login.regions.com |
8 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
5 | www.blog.duino.lk |
www.blog.duino.lk
|
1 | login.regions.com |
www.blog.duino.lk
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
blog.duino.lk cPanel, Inc. Certification Authority |
2020-05-31 - 2020-08-29 |
3 months | crt.sh |
login.regions.com Sectigo RSA Extended Validation Secure Server CA |
2020-04-22 - 2021-04-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/index2.html
Frame ID: AF9A09A1761E1D2A82C9E5B1DED90B72
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
OpenSSL (Web Server Extensions) ExpandDetected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index2.html
www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/ |
14 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.css
www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/mnn_files/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
regions.css
www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/mnn_files/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
RegionsLogo.png
login.regions.com/Themes/RegionsTheme/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background-page-tile.png
www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/mnn_files/ |
21 KB 21 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
openSansBold.woff
www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/RegionsTheme/Fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
openSans.woff
www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/RegionsTheme/Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.blog.duino.lk
- URL
- https://www.blog.duino.lk/wp/wp-admin/css/colors/coffee/regions2020/RegionsTheme/Fonts/openSans.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Regions Bank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.regions.com
www.blog.duino.lk
www.blog.duino.lk
204.93.161.201
205.255.100.240
05c4574031518f9d4e5046c73417489d6fe57924c59b34aad5179cf2cf5ec249
74671781a71e0ca8f9a362356158f072dcc39cee7e614e00be8f99e154a0f897
995ea63f71d734b949dcbe4900fe1cdb653ccdade2ce8c0a17ffe269269c34ba
dcb30b831a47bda7f00394175393dac5785c92527787c28250107c43ead81035
e3e03d62805564a634aaff974a419422f2d1963b1a72b705e02318ae4ef9adcb