gerixq.tk
Open in
urlscan Pro
173.249.48.208
Malicious Activity!
Public Scan
Submission: On August 31 via manual from UY — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 19th 2022. Valid for: 3 months.
This is the only time gerixq.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la República Oriental del Uruguay (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 173.249.48.208 173.249.48.208 | 51167 (CONTABO) (CONTABO) | |
1 | 2a00:1450:400... 2a00:1450:4001:812::200a | 15169 (GOOGLE) (GOOGLE) | |
6 | 3 |
ASN51167 (CONTABO, DE)
PTR: vmi983353.contaboserver.net
gerixq.tk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
gerixq.tk
gerixq.tk |
955 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 43 |
1 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | gerixq.tk |
gerixq.tk
|
1 | fonts.googleapis.com |
gerixq.tk
|
6 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.portal.brou.com.uy |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.gerixq.tk R3 |
2022-08-19 - 2022-11-17 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://gerixq.tk/
Frame ID: F0C65F33945BC5DE3ACD2F8A75330AF3
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
eBROU - BROUDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Portal BROU
Search URL Search Domain Scan URL
Title: Seguridad
Search URL Search Domain Scan URL
Title: Gestión de Reclamos
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
gerixq.tk/ |
206 KB 207 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styleP.css
gerixq.tk/ |
712 KB 712 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
71 KB 0 |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
63 KB 0 |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selectArrowDown.b3a49a7d.svg
gerixq.tk/frontend/static/media/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GothamBook.woff2
gerixq.tk/gotham/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Gotham-Medium.woff2
gerixq.tk/gotham/ |
17 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la República Oriental del Uruguay (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
gerixq.tk/ | Name: PHPSESSID Value: 3b9315ca6e6d00dbdea920f17fbc1fc2 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
gerixq.tk
173.249.48.208
2a00:1450:4001:812::200a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