fashionsholics.com
Open in
urlscan Pro
2a06:98c1:3121::c
Malicious Activity!
Public Scan
Effective URL: https://fashionsholics.com/jss/die/post/info.php
Submission: On February 27 via api from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on February 22nd 2023. Valid for: 3 months.
This is the only time fashionsholics.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 194.113.72.62 194.113.72.62 | 25697 (UPCLOUDUSA) (UPCLOUDUSA) | |
13 | 2a06:98c1:312... 2a06:98c1:3121::c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2a02:26f0:11a... 2a02:26f0:11a::217:9a58 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
20 | 3 |
ASN25697 (UPCLOUDUSA, US)
PTR: 194-113-72-62.us-nyc1.upcloud.host
www.ibpsclub.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
fashionsholics.com
fashionsholics.com |
232 KB |
6 |
typekit.net
use.typekit.net — Cisco Umbrella Rank: 440 |
|
1 |
ibpsclub.com
www.ibpsclub.com |
383 B |
20 | 3 |
Domain | Requested by | |
---|---|---|
13 | fashionsholics.com |
www.ibpsclub.com
fashionsholics.com |
6 | use.typekit.net |
fashionsholics.com
|
1 | www.ibpsclub.com | |
20 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ibpsclub.com R3 |
2023-01-02 - 2023-04-02 |
3 months | crt.sh |
*.fashionsholics.com GTS CA 1P5 |
2023-02-22 - 2023-05-23 |
3 months | crt.sh |
use.typekit.net DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2022-09-14 - 2023-10-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://fashionsholics.com/jss/die/post/info.php
Frame ID: EB4FEBC96805356EB332F39C546EFD39
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
SwissPostPage URL History Show full URLs
- https://www.ibpsclub.com/wp-content/css.html Page URL
- https://fashionsholics.com/jss/die/post/info.php Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
PHP (Programming Languages) Expand
Detected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- <input[^>]+name="__VIEWSTATE
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui[.-]([\d.]*\d)[^/]*\.js
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.ibpsclub.com/wp-content/css.html Page URL
- https://fashionsholics.com/jss/die/post/info.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
css.html
www.ibpsclub.com/wp-content/ |
190 B 383 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
info.php
fashionsholics.com/jss/die/post/ |
23 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rocket-loader.min.js
fashionsholics.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ch.svg
fashionsholics.com/jss/die/post/Redsys_files/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ogilvy-iconoTarjeta.png
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
typeKit.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-1.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
136 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-1_002.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
92 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-ui-1.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
198 KB 52 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l
use.typekit.net/af/7505b0/0000000000000000000124fa/27/ |
0 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l
use.typekit.net/af/802da8/0000000000000000000124f9/27/ |
0 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ScriptResource.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
59 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ScriptResource_002.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
188 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
WebResource.js
fashionsholics.com/jss/die/post/Seleccione%20medio%20de%20pago_fichiers/ |
16 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d
use.typekit.net/af/7505b0/0000000000000000000124fa/27/ |
0 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d
use.typekit.net/af/802da8/0000000000000000000124f9/27/ |
0 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a
use.typekit.net/af/7505b0/0000000000000000000124fa/27/ |
0 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a
use.typekit.net/af/802da8/0000000000000000000124f9/27/ |
0 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)65 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| Typekit function| $ function| jQuery function| DP_jQuery_1677501977893 function| initializeComponents function| validarNro function| confirmarCancelar function| hideLoading function| changeMMPP function| setValues object| __cfQR object| theForm function| __doPostBack function| WebForm_PostBackOptions function| WebForm_DoPostBackWithOptions object| __pendingCallbacks number| __synchronousCallBackIndex function| WebForm_DoCallback function| WebForm_CallbackComplete function| WebForm_ExecuteCallback function| WebForm_FillFirstAvailableSlot boolean| __nonMSDOMBrowser string| __theFormPostData object| __theFormPostCollection object| __callbackTextTypes function| WebForm_InitCallback function| WebForm_InitCallbackAddField function| WebForm_EncodeCallback object| __disabledControlArray function| WebForm_ReEnableControls function| WebForm_ReDisableControls function| WebForm_SimulateClick function| WebForm_FireDefaultButton function| WebForm_GetScrollX function| WebForm_GetScrollY function| WebForm_SaveScrollPositionSubmit function| WebForm_SaveScrollPositionOnSubmit function| WebForm_RestoreScrollPosition function| WebForm_TextBoxKeyHandler function| WebForm_TrimString function| WebForm_AppendToClassName function| WebForm_RemoveClassName function| WebForm_GetElementById function| WebForm_GetElementByTagName function| WebForm_GetElementsByTagName function| WebForm_GetElementDir function| WebForm_GetElementPosition function| WebForm_GetParentByTagName function| WebForm_SetElementHeight function| WebForm_SetElementWidth function| WebForm_SetElementX function| WebForm_SetElementY object| __cultureInfo function| $get function| $create function| $addHandler function| $addHandlers function| $clearHandlers object| Sys function| Type function| $removeHandler object| _events function| $find boolean| __cfRLUnblockHandlers0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fashionsholics.com
use.typekit.net
www.ibpsclub.com
194.113.72.62
2a02:26f0:11a::217:9a58
2a06:98c1:3121::c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