apply.castrovillestatebank.com
Open in
urlscan Pro
198.185.62.83
Public Scan
Submission Tags: @phishunt_io
Submission: On January 19 via api from ES
Summary
TLS certificate: Issued by GeoTrust RSA CA 2018 on July 8th 2020. Valid for: a year.
This is the only time apply.castrovillestatebank.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 198.185.62.83 198.185.62.83 | 16455 (MLATTTW) (MLATTTW) | |
1 | 12.184.142.238 12.184.142.238 | 16455 (MLATTTW) (MLATTTW) | |
6 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
castrovillestatebank.com
apply.castrovillestatebank.com |
325 KB |
1 |
loanspq.com
analytics.loanspq.com |
219 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | apply.castrovillestatebank.com |
apply.castrovillestatebank.com
|
1 | analytics.loanspq.com | |
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
apply.castrovillestatebank.com GeoTrust RSA CA 2018 |
2020-07-08 - 2021-07-08 |
a year | crt.sh |
*.loanspq.com Sectigo RSA Domain Validation Secure Server CA |
2020-05-07 - 2022-08-09 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://apply.castrovillestatebank.com/PageNotFound.aspx
Frame ID: 7F89E728A2BFAEE6349B1124B96A9780
Requests: 6 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- url /\.aspx?(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
PageNotFound.aspx
apply.castrovillestatebank.com/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
smcss.min.css
apply.castrovillestatebank.com/css/Bundled/ |
404 KB 93 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404.png
apply.castrovillestatebank.com/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
smscript.min.js
apply.castrovillestatebank.com/js/Bundled/ |
494 KB 200 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
piwikHandler.ashx
apply.castrovillestatebank.com/inc/Piwik/ |
57 KB 24 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
piwik.php
analytics.loanspq.com/ |
43 B 219 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
48 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| ReportError function| strBrowserInfo function| strGetUniqueValue function| isCordova function| IsNeedCordova function| SuppressKnownError function| loginfo function| logError function| debounceErr function| initEditUploadUserAvatar object| OBSERVERDB object| currentAvatarFile object| _NOTY string| _COMMON_SORT_COLUMN string| _COMMON_SORT_TYPE number| _COMMON_PAGE_INDEX number| _COMMON_PAGE_SIZE boolean| _COMMON_IS_SORTING string| _COMMON_CURRENT_SORT_TYPE number| _COMMON_FILTER_DATE_TIME_SPAN number| _COMMON_FILTER_MAX_TIME_SPAN object| VALIDATION_PATTERN_REPOSITORY object| _COMMON function| $ function| jQuery object| bootstrap function| BootstrapDialog function| noty function| Dropzone function| _ object| Pace function| moment function| LPQGrid function| currentURL object| _paq object| JSON2 object| Piwik object| AnalyticsTracker function| piwik_log1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
apply.castrovillestatebank.com/ | Name: ASP.NET_SessionId Value: nvfyn2upam04w4grczqh2zze |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
analytics.loanspq.com
apply.castrovillestatebank.com
12.184.142.238
198.185.62.83
3d97f232ff56d2f9a968d83eba22d2bfa63418ddc665afa10f05e35a1077c18f
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
a931077b6b58a99535d14248a19a8a8ada8baa905f9783a0d5c139c540d7f785
bb94b2d8c91ca75f160fa88adcd9d65364bbb49b02be39e04a1624054d7f5b13
d022804640550dc3260b7055c418566bd9d4d9c30cc71a6d830a8e0b46c7a674
ec3c0e7f05054070badd62b8898aec4e669ded4af55daf6bd9b228b3ec977130