appviagespontosbr.com
Open in
urlscan Pro
162.241.60.223
Malicious Activity!
Public Scan
Submission Tags: 6443359
Submission: On March 10 via api from NL
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on March 9th 2020. Valid for: 3 months.
This is the only time appviagespontosbr.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 162.241.60.223 162.241.60.223 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
3 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
8 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-60-223.unifiedlayer.com
appviagespontosbr.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
appviagespontosbr.com
appviagespontosbr.com |
2 MB |
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
47 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
4 | appviagespontosbr.com |
appviagespontosbr.com
|
3 | maxcdn.bootstrapcdn.com |
appviagespontosbr.com
|
1 | code.jquery.com |
appviagespontosbr.com
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
appviagespontosbr.com Sectigo RSA Domain Validation Secure Server CA |
2020-03-09 - 2020-06-07 |
3 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://appviagespontosbr.com/sempre/presente/premios/de/montao/bklcom_dll.php
Frame ID: 023543BD255FBBBB91E579D211CE4B5A
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
bklcom_dll.php
appviagespontosbr.com/sempre/presente/premios/de/montao/ |
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ita.css
appviagespontosbr.com/sempre/presente/premios/de/montao/ita_css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
x2-logo-itaucard.png
appviagespontosbr.com/sempre/presente/premios/de/montao/ita_imagen/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
doodle_ferias_app_v4_25_1440.jpg
appviagespontosbr.com/sempre/presente/premios/de/montao/ita_imagen/ |
2 MB 2 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyphicons-halflings-regular.woff2
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/fonts/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| mascara function| execmascara function| mcc function| id function| validar function| verifica_cpf_cnpj function| calc_digitos_posicoes function| valida_cpf function| valida_cnpj function| valida_cpf_cnpj function| formata_cpf_cnpj function| mtel0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
appviagespontosbr.com
code.jquery.com
maxcdn.bootstrapcdn.com
162.241.60.223
2001:4de0:ac19::1:b:1a
2001:4de0:ac19::1:b:2a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