tweezerslib.com
Open in
urlscan Pro
47.245.34.28
Malicious Activity!
Public Scan
Submission: On February 03 via automatic, source phishtank
Summary
This is the only time tweezerslib.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ABSA (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 47.245.34.28 47.245.34.28 | 45102 (CNNIC-ALI...) (CNNIC-ALIBABA-US-NET-AP Alibaba (US) Technology Co.) | |
1 | 2a00:1450:400... 2a00:1450:4001:824::200a | 15169 (GOOGLE) (GOOGLE) | |
6 | 169.202.9.74 169.202.9.74 | 14115 (AMALGAMAT...) (AMALGAMATED-BSA) | |
4 | 2606:4700:303... 2606:4700:3032::681b:933b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
20 | 4 |
ASN45102 (CNNIC-ALIBABA-US-NET-AP Alibaba (US) Technology Co., Ltd., CN)
tweezerslib.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
tweezerslib.com
tweezerslib.com |
235 KB |
6 |
absa.co.za
ib.absa.co.za |
4 KB |
4 |
smartlookllc.com
smartlookllc.com |
|
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
20 | 4 |
Domain | Requested by | |
---|---|---|
9 | tweezerslib.com |
tweezerslib.com
ajax.googleapis.com |
6 | ib.absa.co.za |
tweezerslib.com
|
4 | smartlookllc.com |
tweezerslib.com
|
1 | ajax.googleapis.com |
tweezerslib.com
|
20 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
ib.absa.co.za |
www.absa.co.za |
Subject Issuer | Validity | Valid | |
---|---|---|---|
tweezerslib.com cPanel, Inc. Certification Authority |
2020-02-03 - 2020-05-03 |
3 months | crt.sh |
*.storage.googleapis.com GTS CA 1O1 |
2020-01-14 - 2020-04-07 |
3 months | crt.sh |
ib.absa.co.za DigiCert SHA2 Extended Validation Server CA |
2019-06-11 - 2021-07-03 |
2 years | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-01-13 - 2020-10-09 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://tweezerslib.com/.well-known/asheeto/ibabsa/~AbsaOnline.htm
Frame ID: 273103F9683CCC5535293E7CABCCA382
Requests: 20 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Title: Registration
Search URL Search Domain Scan URL
Title: Absa home page
Search URL Search Domain Scan URL
Title: Absa's online security measures
Search URL Search Domain Scan URL
Title: Latest scams
Search URL Search Domain Scan URL
Title: Latest internet security software
Search URL Search Domain Scan URL
Title: Old interface switched off
Search URL Search Domain Scan URL
Title: Absa Listed Beneficiaries - accounts closed
Search URL Search Domain Scan URL
Title: Inter-Bank Payment delay
Search URL Search Domain Scan URL
Title: Contact us
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Software requirements
Search URL Search Domain Scan URL
Title: Banking regulations
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
~AbsaOnline.htm
tweezerslib.com/.well-known/asheeto/ibabsa/ |
14 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
absa.css
tweezerslib.com/.well-known/asheeto/ibabsa/css/ |
149 KB 149 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
tweezerslib.com/.well-known/asheeto/ibabsa/css/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jcaptcha.css
tweezerslib.com/.well-known/asheeto/ibabsa/css/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.4/ |
95 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dice.js
tweezerslib.com/.well-known/asheeto/ibabsa/js/ |
69 B 322 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
absajslogo.php
tweezerslib.com/.well-known/asheeto/ibabsa/php2/ |
15 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax-loader-2.gif
tweezerslib.com/.well-known/asheeto/ibabsa/images/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-red.png
tweezerslib.com/.well-known/asheeto/ibabsa/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite-corners-rounded.png
ib.absa.co.za/absa-online/static/style/resources/ |
246 B 547 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax_load_jsonp.php
tweezerslib.com/.well-known/asheeto/ibabsa/php2/ |
43 KB 43 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dot_002.gif
smartlookllc.com/.well-known/asheeto/ibabsa/images/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
locale_en.gif
smartlookllc.com/.well-known/asheeto/ibabsa/images/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
campaigne_1_ENG.png
smartlookllc.com/.well-known/asheeto/ibabsa/images/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
campaigne_3_post_golive_EN.jpg
smartlookllc.com/.well-known/asheeto/ibabsa/images/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-questionmark-grey_2019.png
ib.absa.co.za/absa-online/static/style/resources/ |
362 B 663 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keypad-bg.gif
ib.absa.co.za/absa-online/static/style/www.absa.co.za.2009.ui/keypad/ |
439 B 740 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
key-button.gif
ib.absa.co.za/absa-online/static/style/www.absa.co.za.2009.ui/resources/ |
379 B 680 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keypad-backspace.png
ib.absa.co.za/absa-online/static/style/www.absa.co.za.2009.ui/resources/ |
209 B 510 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite-icons-bar-status_2019.png
ib.absa.co.za/absa-online/static/style/resources/ |
643 B 944 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ABSA (Banking)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery string| siteURL function| checkPwd function| heartBeatPasswordPAGE function| loginContinue2 function| onForm1Submit object| absa function| google function| doMoveForm2Focus function| checkEntries2 function| loginContinue3 function| showErrorMessage function| hideErrorMessage function| loginContinue4 function| googleAdsense function| googleAdsenseGoogle0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
ib.absa.co.za
smartlookllc.com
tweezerslib.com
169.202.9.74
2606:4700:3032::681b:933b
2a00:1450:4001:824::200a
47.245.34.28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