bayareafastrakinvoice.com
Open in
urlscan Pro
5.8.47.100
Malicious Activity!
Public Scan
Submission: On August 15 via manual from US — Scanned from NL
Summary
TLS certificate: Issued by R10 on August 13th 2024. Valid for: 3 months.
This is the only time bayareafastrakinvoice.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 5.8.47.100 5.8.47.100 | 35277 (LLHOST-IN...) (LLHOST-INC-SRL) | |
3 | 142.250.185.100 142.250.185.100 | 15169 (GOOGLE) (GOOGLE) | |
1 | 142.250.74.202 142.250.74.202 | 15169 (GOOGLE) (GOOGLE) | |
1 | 142.250.186.163 142.250.186.163 | 15169 (GOOGLE) (GOOGLE) | |
7 | 4 |
ASN35277 (LLHOST-INC-SRL, RO)
PTR: vps.13425739.llhost-inc.eu
bayareafastrakinvoice.com |
ASN15169 (GOOGLE, US)
PTR: fra16s49-in-f4.1e100.net
www.google.com |
ASN15169 (GOOGLE, US)
PTR: fra24s02-in-f10.1e100.net
ajax.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: fra24s08-in-f3.1e100.net
www.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
google.com
www.google.com — Cisco Umbrella Rank: 10 |
961 B |
2 |
bayareafastrakinvoice.com
bayareafastrakinvoice.com |
2 KB |
1 |
gstatic.com
www.gstatic.com |
211 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 |
33 KB |
7 | 4 |
Domain | Requested by | |
---|---|---|
3 | www.google.com |
bayareafastrakinvoice.com
www.gstatic.com |
2 | bayareafastrakinvoice.com | |
1 | www.gstatic.com |
www.google.com
|
1 | ajax.googleapis.com |
bayareafastrakinvoice.com
|
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bayareafastrakinvoice.com R10 |
2024-08-13 - 2024-11-11 |
3 months | crt.sh |
*.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
This page contains 3 frames:
Primary Page:
https://bayareafastrakinvoice.com/
Frame ID: 2291914AA5BA919804D59D1E605C790A
Requests: 5 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lc0MyYqAAAAAHgV8DruMvIjarrSP_cfmgmsV8JW&co=aHR0cHM6Ly9iYXlhcmVhZmFzdHJha2ludm9pY2UuY29tOjQ0Mw..&hl=nl&v=hfUfsXWZFeg83qqxrK27GB8P&theme=light&size=normal&cb=krs7u7g8tvtb
Frame ID: 52ECC4C31C48CFA739D6E13C9F490E2C
Requests: 1 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/bframe?hl=nl&v=hfUfsXWZFeg83qqxrK27GB8P&k=6Lc0MyYqAAAAAHgV8DruMvIjarrSP_cfmgmsV8JW
Frame ID: 127773CBB6AE7C8E5AD3183AD00A6057
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
reCAPTCHA (Captchas) Expand
Detected patterns
- <div[^>]+class="g-recaptcha"
- /recaptcha/api\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bayareafastrakinvoice.com/ |
1 KB 963 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
www.google.com/recaptcha/ |
1 KB 961 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.3/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
recaptcha__nl.js
www.gstatic.com/recaptcha/releases/hfUfsXWZFeg83qqxrK27GB8P/ |
532 KB 211 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
anchor
www.google.com/recaptcha/api2/ Frame 52EC |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bframe
www.google.com/recaptcha/api2/ Frame 1277 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
bayareafastrakinvoice.com/ |
1 KB 988 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
August 15th 2024, 4:23:49 pm
UTC —
From United States
Threats:
Brand Impersonation
Social Engineering
Phishing
Comment: Impersonating US-based Bay Area FasTrak toll company via scam text messages referencing unpaid toll balances, directing victims to this website
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| ___grecaptcha_cfg object| grecaptcha string| __recaptcha_api boolean| __google_recaptcha_client function| $ function| jQuery function| onReturnCallback object| recaptcha object| closure_lm_7675171 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bayareafastrakinvoice.com/ | Name: PHPSESSID Value: 3o9gb148tr4s56v34ff3qo41n0 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bayareafastrakinvoice.com
www.google.com
www.gstatic.com
142.250.185.100
142.250.186.163
142.250.74.202
5.8.47.100
544e3ace54f30184971f32529e1d9001cd2a60ddbb7b64b0af2d90a2de98a940
679e7e62b81267c93d0778083ae0fd0efe24172ff0ac581835b54165b3d9ed43
68053f89e7526bb93d16cdfc61dbca43febf7500cb486f608a86773f40d61ec1
7c3f0d352a19c30749eb4b515348b354a824cd593bb4710bf507e7bec46c3813
aec3d419d50f05781a96f223e18289aeb52598b5db39be82a7b71dc67d6a7947