saudi-k.com
Open in
urlscan Pro
2606:4700:3031::ac43:89f1
Malicious Activity!
Public Scan
Submission: On February 29 via api from US — Scanned from US
Summary
TLS certificate: Issued by GTS CA 1P5 on January 13th 2024. Valid for: 3 months.
This is the only time saudi-k.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Scotiabank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 2606:4700:303... 2606:4700:3031::ac43:89f1 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
saudi-k.com
saudi-k.com |
41 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | saudi-k.com |
saudi-k.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
saudi-k.com GTS CA 1P5 |
2024-01-13 - 2024-04-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://saudi-k.com/
Frame ID: 14035A7F649FBB785BAE56D5D2C5BA15
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
saudi-k.com/ |
76 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.30039a1c4409c4589a1d.css
saudi-k.com/archivos/ |
169 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logg.svg
saudi-k.com/archivos/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ubic.png
saudi-k.com/archivos/ |
595 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
call.png
saudi-k.com/archivos/ |
674 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Lt.6153dce96e9dc4528f0f.woff2
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Headline.aa9ccae8fcc3543dda41.woff2
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Bd.bcf523a447f011358b09.woff2
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Headline.d14a2341b8497eecf7a9.woff
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Lt.fc1f7392290e3cc880a5.woff
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Rg.58ae0df055c87072c593.woff2
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Bd.e5dbf98bca38ef6433c1.woff
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Scotia_W_Rg.54bd4ddeecac6bcd0392.woff
saudi-k.com/archivos/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Scotiabank (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
saudi-k.com
2606:4700:3031::ac43:89f1
0814da1c61ae2e8da787dd3ab70dbc2783d5e9acb9e69f8c541ebaf42ed13325
665c561df526fa5cb3e24316fc959521b9f3a648663797e1b7212cb89f369c70
7cc2a30f8a51aa97732ca36b85a4c85be9e68d3d6dde467f9b25ddbcd46ac3ad
a0bac37a57358da850b581bc2b6a45a6776fee9aa288f6be93bfb58a57360f87
f65e59f925b43338ae2e679ac1eed5c7971e0a1ffc63ba55d7576b950e08ddd4