happypet.lt
Open in
urlscan Pro
79.98.28.15
Malicious Activity!
Public Scan
Submission: On December 08 via automatic, source openphish
Summary
This is the only time happypet.lt was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 79.98.28.15 79.98.28.15 | 62282 (RACKRAY U...) (RACKRAY UAB Rakrejus) | |
5 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
happypet.lt
happypet.lt |
17 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | happypet.lt |
happypet.lt
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://happypet.lt/wp-content/themes/twentyfifteen/santando/css/fers/4a98e/3mara.html
Frame ID: 63DF76D2B85B30E250139EBC0D1D28D4
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
3mara.html
happypet.lt/wp-content/themes/twentyfifteen/santando/css/fers/4a98e/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yalahbyanlia.css
happypet.lt/wp-content/themes/twentyfifteen/santando/css/fers/4a98e/l3amer/ |
2 KB 687 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ltaht.gif
happypet.lt/wp-content/themes/twentyfifteen/santando/css/fers/4a98e/l3amer/ |
3 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lfor.jpg
happypet.lt/wp-content/themes/twentyfifteen/santando/css/fers/4a98e/l3amer/ |
11 KB 11 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
psss.gif
happypet.lt/wp-content/themes/twentyfifteen/santando/css/fers/4a98e/l3amer/ |
43 B 390 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| checkForm function| checkDocumento0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
happypet.lt
79.98.28.15
09050c217898d737ed036458a5bad634b7122a75698a10f074ee4fe16a1ea0a4
3071f7d9ea14c5507ac0421c878f9419cc89dc151196b97c537df33934a7c575
3d11c3ed11f33122009d6ce1948087247e23a105d3b55bb4b2f1d3d59ea3705d
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
c52beba0879fb79d669f9cbbd8453e536e5144b3293b46a756c083ff09f975c6