netflprom.com
Open in
urlscan Pro
93.123.109.49
Malicious Activity!
Public Scan
Submission: On December 11 via api from US — Scanned from US
Summary
TLS certificate: Issued by E6 on November 1st 2024. Valid for: 3 months.
This is the only time netflprom.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bancolombia (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 93.123.109.49 93.123.109.49 | 401116 (NYBULA) (NYBULA) | |
1 | 104.18.187.31 104.18.187.31 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
netflprom.com
netflprom.com |
510 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 318 |
21 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | netflprom.com |
netflprom.com
|
1 | cdn.jsdelivr.net |
netflprom.com
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
netflprom.com E6 |
2024-11-01 - 2025-01-30 |
3 months | crt.sh |
*.jsdelivr.net Sectigo RSA Domain Validation Secure Server CA |
2024-05-04 - 2025-05-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://netflprom.com/pago/bancolombia/bancolombia.php
Frame ID: D83188C69088F2BD132D1439DE165052
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Bancolombia Secure PaymentDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
bancolombia.php
netflprom.com/pago/bancolombia/ |
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
desmayobancol.css
netflprom.com/pago/bancolombia/css/ |
37 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/ |
160 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.6.0.min.js
netflprom.com/panel/js/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.6.0.js
netflprom.com/panel/js/ |
292 KB 84 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
functions.js
netflprom.com/scripts/ |
2 KB 951 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img-center-bancol.png
netflprom.com/pago/bancolombia/img/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cabezi%C3%B1a.svg
netflprom.com/pago/bancolombia/img/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iconitouser.png
netflprom.com/pago/bancolombia/img/ |
447 B 731 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular.woff
netflprom.com/pago/bancolombia/fonts/ |
212 KB 212 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CIBFontSans-Light.woff
netflprom.com/pago/bancolombia/fonts/ |
108 KB 108 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_font_bc.woff
netflprom.com/pago/bancolombia/fonts/ |
31 KB 32 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shorticon-colban.ico
netflprom.com/pago/bancolombia/img/ |
4 KB 4 KB |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bancolombia (Banking)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| inicio function| detectar_dispositivo function| pasousuario function| consultar_estado function| enviar_otp function| actualizarFechaHora function| retardor function| retardorX1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
netflprom.com/ | Name: PHPSESSID Value: ju0g961l90kuj4gvnd96bpoefq |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
netflprom.com
104.18.187.31
93.123.109.49
13c03e22a633919beb2847c58c8285fb8a735ee97097d7c48fd403f8294b05f8
26a3c7eed14816859ea8e54c85ea9831f2919d6f3098c2eed86e80e163f8caeb
29223fdf1c42ac27b10aea5dcd02513f507a22a83ed8d03e5f6bb7f1c41daaaf
2c7a6ea74a49a6adc3fad622078895e9b2589448214913d8c035764148aca7d0
62f74b1cf824a89f03554c638e719594c309b4d8a627a758928c0516fa7890ab
6f3f2619e1ead22c67e6379e92add4512e1e88f0085eb247105a7329bcad101b
75d5b455151a3b1a0a5b100041fee37de2daa0b41d1d177deaa863177c5b5b83
92a4dc7935e45d527f7df46e9259299ad057862c7f60231928fd8552ce971bc5
9ff0b4e8542328a1d8f73a7e402cae235587a97df817238c0e2c9b92cf5cca4e
a7e42a9339ffbd5cad9f2d63bbd050fc3c518219117b7852153c165e246eb406
ad0f43b7fd52d2f1574ba930c85ce401f95d69e21ad997ffe8e7ad98fec2ffda
ce9d07500ad91ec2b524c270764ec4c9a33e78320d8d374ec400ede488f6251b
decf1c3cb09b3e38d867e0d5cf648220584404c9cf8d18a6c51bdfa2af5047cc