c2251424.ferozo.com Open in urlscan Pro
2800:6c0:2::192  Malicious Activity! Public Scan

URL: http://c2251424.ferozo.com/
Submission: On November 01 via automatic, source phishtank — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 2800:6c0:2::192, located in Rosario, Argentina and belongs to Dattatec.com, AR. The main domain is c2251424.ferozo.com.
This is the only time c2251424.ferozo.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Banco Pichincha (Banking)

Domain & IP information

IP Address AS Autonomous System
4 2800:6c0:2::192 27823 (Dattatec.com)
4 1
Apex Domain
Subdomains
Transfer
4 ferozo.com
c2251424.ferozo.com
63 KB
4 1
Domain Requested by
4 c2251424.ferozo.com c2251424.ferozo.com
4 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://c2251424.ferozo.com/
Frame ID: CD7ABC626D4ECCE91B29F4D7F3D11230
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Personas

Page Statistics

4
Requests

0 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

63 kB
Transfer

65 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
c2251424.ferozo.com/
3 KB
1 KB
Document
General
Full URL
http://c2251424.ferozo.com/
Protocol
HTTP/1.1
Server
2800:6c0:2::192 Rosario, Argentina, ASN27823 (Dattatec.com, AR),
Reverse DNS
Software
Apache / PHP/7.4.25
Resource Hash
eaad98db8d475b3cfef41df2e49ef6c9a615dba82fe2a68647c2102c17104a8c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Upgrade, Keep-Alive
Content-Encoding
gzip
Content-Length
1026
Content-Type
text/html; charset=UTF-8
Date
Tue, 01 Nov 2022 07:53:35 GMT
Keep-Alive
timeout=10, max=200
Server
Apache
Upgrade
h2,h2c
Vary
Accept-Encoding
X-Powered-By
PHP/7.4.25
plg1.svg
c2251424.ferozo.com/
5 KB
5 KB
Image
General
Full URL
http://c2251424.ferozo.com/plg1.svg
Requested by
Host: c2251424.ferozo.com
URL: http://c2251424.ferozo.com/
Protocol
HTTP/1.1
Server
2800:6c0:2::192 Rosario, Argentina, ASN27823 (Dattatec.com, AR),
Reverse DNS
Software
Apache /
Resource Hash
80666bbd7235a1842a770d8a390081993addb555e6d5075ceb3ac2f4edddb804

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://c2251424.ferozo.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

Date
Tue, 01 Nov 2022 07:53:36 GMT
Last-Modified
Sat, 29 Oct 2022 11:34:14 GMT
Server
Apache
ETag
"1270-5ec2ac1094254"
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=10, max=199
Content-Length
4720
bg1.jpg
c2251424.ferozo.com/
196 B
196 B
Image
General
Full URL
http://c2251424.ferozo.com/bg1.jpg
Requested by
Host: c2251424.ferozo.com
URL: http://c2251424.ferozo.com/
Protocol
HTTP/1.1
Server
2800:6c0:2::192 Rosario, Argentina, ASN27823 (Dattatec.com, AR),
Reverse DNS
Software
Apache /
Resource Hash
80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://c2251424.ferozo.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

Date
Tue, 01 Nov 2022 07:53:36 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=10, max=200
Content-Length
196
Content-Type
text/html; charset=iso-8859-1
pfr1.svg
c2251424.ferozo.com/
57 KB
57 KB
Image
General
Full URL
http://c2251424.ferozo.com/pfr1.svg
Requested by
Host: c2251424.ferozo.com
URL: http://c2251424.ferozo.com/
Protocol
HTTP/1.1
Server
2800:6c0:2::192 Rosario, Argentina, ASN27823 (Dattatec.com, AR),
Reverse DNS
Software
Apache /
Resource Hash
73aa6e1acd68787f440b16f98942fa836641d9f1497ebc6d40bf258d3d958043

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://c2251424.ferozo.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

Date
Tue, 01 Nov 2022 07:53:36 GMT
Last-Modified
Sat, 29 Oct 2022 11:34:13 GMT
Server
Apache
ETag
"e2f6-5ec2ac0ed1783"
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=10, max=198
Content-Length
58102

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Banco Pichincha (Banking)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: http://c2251424.ferozo.com/bg1.jpg
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)