portalunitoken.club Open in urlscan Pro
34.68.47.74  Malicious Activity! Public Scan

URL: https://portalunitoken.club/ddddddddddd/
Submission: On October 22 via manual from BR

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 7 HTTP transactions. The main IP is 34.68.47.74, located in United States and belongs to GOOGLE - Google LLC, US. The main domain is portalunitoken.club.
TLS certificate: Issued by Let's Encrypt Authority X3 on October 17th 2019. Valid for: 3 months.
This is the only time portalunitoken.club was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Banking (Banking)

Domain & IP information

IP Address AS Autonomous System
6 34.68.47.74 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
7 2
Apex Domain
Subdomains
Transfer
6 portalunitoken.club
portalunitoken.club
13 KB
1 googleapis.com
ajax.googleapis.com
30 KB
7 2
Domain Requested by
6 portalunitoken.club portalunitoken.club
1 ajax.googleapis.com portalunitoken.club
7 2

This site contains no links.

Subject Issuer Validity Valid
portalunitoken.club
Let's Encrypt Authority X3
2019-10-17 -
2020-01-15
3 months crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh

This page contains 1 frames:

Primary Page: https://portalunitoken.club/ddddddddddd/
Frame ID: 7617D546C44293EA19549CE25DEB744C
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

7
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

44 kB
Transfer

166 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
portalunitoken.club/ddddddddddd/
1 KB
943 B
Document
General
Full URL
https://portalunitoken.club/ddddddddddd/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.68.47.74 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
74.47.68.34.bc.googleusercontent.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
1c93a5e898815dc83fdfdd6d6cdb07bec2757c8500fc6a0e199b96de9f7ed2a7

Request headers

Host
portalunitoken.club
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Date
Tue, 22 Oct 2019 02:24:34 GMT
Server
Apache/2.4.7 (Ubuntu)
Last-Modified
Fri, 26 Jul 2019 16:00:58 GMT
ETag
"522-58e97a5e4e280-gzip"
Accept-Ranges
bytes
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
607
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html
transition.css
portalunitoken.club/ddddddddddd/css/
67 KB
4 KB
Stylesheet
General
Full URL
https://portalunitoken.club/ddddddddddd/css/transition.css
Requested by
Host: portalunitoken.club
URL: https://portalunitoken.club/ddddddddddd/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.68.47.74 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
74.47.68.34.bc.googleusercontent.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
a8aa5cde45794a32137f15fa65aa5c10f5b5cde25c7212659aa9df5a983be335

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://portalunitoken.club/ddddddddddd/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 22 Oct 2019 02:24:34 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jul 2019 17:27:27 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"10b7f-58e2028227dc0-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4015
style.css
portalunitoken.club/ddddddddddd/css/
2 KB
951 B
Stylesheet
General
Full URL
https://portalunitoken.club/ddddddddddd/css/style.css
Requested by
Host: portalunitoken.club
URL: https://portalunitoken.club/ddddddddddd/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.68.47.74 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
74.47.68.34.bc.googleusercontent.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
174a026a73bb790f0fdc976bda3258243b746369d9f3d4e63e50f2a531755594

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://portalunitoken.club/ddddddddddd/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 22 Oct 2019 02:24:34 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jul 2019 18:14:07 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"70e-58e20cf0719c0-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
617
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/
85 KB
30 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js
Requested by
Host: portalunitoken.club
URL: https://portalunitoken.club/ddddddddddd/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://portalunitoken.club/ddddddddddd/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 10 Oct 2019 08:21:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1015364
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
30399
x-xss-protection
0
last-modified
Thu, 25 Jan 2018 15:33:24 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 09 Oct 2020 08:21:50 GMT
jquery.mask.min.js
portalunitoken.club/ddddddddddd/scripts/
8 KB
4 KB
Script
General
Full URL
https://portalunitoken.club/ddddddddddd/scripts/jquery.mask.min.js
Requested by
Host: portalunitoken.club
URL: https://portalunitoken.club/ddddddddddd/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.68.47.74 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
74.47.68.34.bc.googleusercontent.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
bbb318e841b96acb3c2614eec417a4d7caf9606ea996507dccba84e2f6724e7e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://portalunitoken.club/ddddddddddd/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 22 Oct 2019 02:24:34 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jul 2019 17:27:27 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"1ff9-58e2028227dc0-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3396
script.js
portalunitoken.club/ddddddddddd/scripts/
507 B
665 B
Script
General
Full URL
https://portalunitoken.club/ddddddddddd/scripts/script.js
Requested by
Host: portalunitoken.club
URL: https://portalunitoken.club/ddddddddddd/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.68.47.74 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
74.47.68.34.bc.googleusercontent.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
130b32c0d38a766310718cd4a6b39a161eaab9ca42b509e021058878469ff075

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://portalunitoken.club/ddddddddddd/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 22 Oct 2019 02:24:34 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jul 2019 17:27:27 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"1fb-58e2028227dc0-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
316
logo1.png
portalunitoken.club/ddddddddddd/images/
3 KB
3 KB
Image
General
Full URL
https://portalunitoken.club/ddddddddddd/images/logo1.png
Requested by
Host: portalunitoken.club
URL: https://portalunitoken.club/ddddddddddd/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.68.47.74 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
74.47.68.34.bc.googleusercontent.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
c5f3887240e54467f03387c33bb02530ab0294d305077a4c9899651662f4e3a7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://portalunitoken.club/ddddddddddd/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 22 Oct 2019 02:24:34 GMT
Last-Modified
Sat, 20 Jul 2019 17:27:27 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"b12-58e2028227dc0"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2834

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Banking (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery object| $jscomp

0 Cookies