putarangka.com
Open in
urlscan Pro
2606:4700:30::681b:b543
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On July 10 via api from GB
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 8th 2019. Valid for: a year.
This is the only time putarangka.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BB&T Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 2606:4700:30:... 2606:4700:30::681b:b543 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 173.241.240.55 173.241.240.55 | 36089 (OPENX-AS1) (OPENX-AS1 - OPENX TECHNOLOGIES) | |
23 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
putarangka.com |
ASN36089 (OPENX-AS1 - OPENX TECHNOLOGIES, INC., US)
PTR: ox-173-241-240-55.xa.dc.openx.org
ox-d.bbt.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
putarangka.com
putarangka.com |
210 KB |
1 |
bbt.com
ox-d.bbt.com |
125 B |
23 | 2 |
Domain | Requested by | |
---|---|---|
22 | putarangka.com |
putarangka.com
|
1 | ox-d.bbt.com |
putarangka.com
|
23 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-03-08 - 2020-03-08 |
a year | crt.sh |
ox-d.bbt.com DigiCert SHA2 Extended Validation Server CA |
2018-01-04 - 2020-01-05 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/1.html
Frame ID: 0BDC64C3EE1D1E361E58E85C77820CD2
Requests: 23 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
1.html
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/ |
51 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.css
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
209 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.js
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.js
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
30 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
179 B 281 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
265 B 478 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
11 KB 11 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
33.png
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
362 B 464 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.jpg
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
53 KB 53 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.jpg
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
69 KB 69 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/ |
288 B 288 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.svg
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/ |
288 B 288 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.js
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-light-webfont.woff2
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.woff2
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
robotoslab-regular-webfont.woff2
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-medium-webfont.woff2
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arj
ox-d.bbt.com/ma/1.0/ |
0 125 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.woff
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-medium-webfont.woff
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
robotoslab-regular-webfont.woff
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.woff
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
putarangka.com/wp-content/plugins/jetpack/views/zz/www.BBT/BBT/T.goe/ |
288 B 288 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BB&T Bank (Banking)81 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| Validator function| sfm_validator_enable_focus function| add_addnl_vfunction function| set_addnl_vfunction function| run_addnl_validations function| sfm_set_focus function| sfm_disable_validations function| sfm_enable_show_msgs_together function| sfm_validator_message_disp_pos function| clear_all_validations function| form_submit_handler function| add_validation function| handle_item_on_killfocus function| validator_enable_OPED function| validator_enable_OPED_SB function| sfm_ErrorDisplayHandler function| edh_clear_msgs function| edh_FinalShowMsg function| edh_EnableOnPageDisplay function| edh_ShowMsg function| AlertMsgDisplayer function| alert_clearmsg function| alert_showmsg function| sfm_show_error_msg function| SingleBoxErrorDisplay function| sb_div_clearmsg function| sb_div_showmsg function| form_error_div_name function| sfm_show_div_msg function| DivMsgDisplayer function| div_clearmsg function| element_div_name function| div_showmsg function| show_div_msg function| ValidationDesc function| vdesc_validate function| ValidationSet function| add_validationdesc function| vset_validate function| validateEmail function| TestComparison function| TestSelMin function| TestSelMax function| IsCheckSelected function| TestDontSelectChk function| TestShouldSelectChk function| TestRequiredInput function| TestFileExtension function| TestMaxLen function| TestMinLen function| TestInputType function| TestEmail function| TestLessThan function| TestGreaterThan function| TestRegExp function| TestDontSelect function| TestSelectOneRadio function| TestSelectRadio function| validateInput function| VWZ_IsListItemSelected function| VWZ_IsChecked function| sfm_str_trim function| VWZ_IsEmpty object| frmvalidator string| activeHomeHR object| MP function| objToString function| switchLanguage function| _classCallCheck function| _createClass function| Alert function| Button function| Collapse function| Dropdown function| Tab object| Util1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.putarangka.com/ | Name: __cfduid Value: da1c99d400e0d4b2e2546fb3c5b3082e11562746027 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ox-d.bbt.com
putarangka.com
173.241.240.55
2606:4700:30::681b:b543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