southerncaliforniapowerstrokes.com
Open in
urlscan Pro
208.92.162.130
Malicious Activity!
Public Scan
Effective URL: https://southerncaliforniapowerstrokes.com/chase/step2.php?cmd=login_submit&id=$praga$praga&session=$praga$praga
Submission Tags: 6332598
Submission: On December 23 via api from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 12th 2019. Valid for: 3 months.
This is the only time southerncaliforniapowerstrokes.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 208.92.162.130 208.92.162.130 | 19237 (OMNIS) (OMNIS - Omnis Network) | |
2 | 2606:4700:20:... 2606:4700:20::681a:484 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 143.204.208.137 143.204.208.137 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 | 2a00:1450:400... 2a00:1450:4001:814::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
12 | 5 |
ASN19237 (OMNIS - Omnis Network, LLC, US)
PTR: glacier.superwebhost.com
southerncaliforniapowerstrokes.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
getstencil.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-143-204-208-137.fra53.r.cloudfront.net
d3b1ak9ylguumf.cloudfront.net |
ASN15169 (GOOGLE - Google LLC, US)
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
southerncaliforniapowerstrokes.com
southerncaliforniapowerstrokes.com |
465 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
2 |
getstencil.com
getstencil.com |
81 KB |
1 |
gstatic.com
fonts.gstatic.com |
15 KB |
1 |
cloudfront.net
d3b1ak9ylguumf.cloudfront.net |
66 KB |
12 | 5 |
Domain | Requested by | |
---|---|---|
6 | southerncaliforniapowerstrokes.com |
southerncaliforniapowerstrokes.com
|
2 | fonts.googleapis.com |
southerncaliforniapowerstrokes.com
|
2 | getstencil.com |
southerncaliforniapowerstrokes.com
|
1 | fonts.gstatic.com |
southerncaliforniapowerstrokes.com
|
1 | d3b1ak9ylguumf.cloudfront.net |
southerncaliforniapowerstrokes.com
|
12 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
southerncaliforniapowerstrokes.com cPanel, Inc. Certification Authority |
2019-11-12 - 2020-02-10 |
3 months | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-11-14 - 2020-10-09 |
a year | crt.sh |
*.storage.googleapis.com GTS CA 1O1 |
2019-12-03 - 2020-02-25 |
3 months | crt.sh |
*.cloudfront.net DigiCert Global CA G2 |
2019-07-17 - 2020-07-05 |
a year | crt.sh |
*.google.com GTS CA 1O1 |
2019-12-03 - 2020-02-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://southerncaliforniapowerstrokes.com/chase/step2.php?cmd=login_submit&id=$praga$praga&session=$praga$praga
Frame ID: BC5D03BF2884B3DAE5652FB33C2B5883
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://southerncaliforniapowerstrokes.com/chase/validating.php Page URL
- https://southerncaliforniapowerstrokes.com/chase/step2.php?cmd=login_submit&id=$praga$praga&session=$praga$praga Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://southerncaliforniapowerstrokes.com/chase/validating.php Page URL
- https://southerncaliforniapowerstrokes.com/chase/step2.php?cmd=login_submit&id=$praga$praga&session=$praga$praga Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
validating.php
southerncaliforniapowerstrokes.com/chase/ |
5 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.prod.css
getstencil.com/app/static/compiled/ |
954 KB 79 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
8 KB 710 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.boot.7981a15c9b6d955fdbf348440080490d.js
getstencil.com/app/static/compiled/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
d3b1ak9ylguumf.cloudfront.net/app/static/vendors/source/external/Font-Awesome/v4.5.0/fonts/ |
65 KB 66 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u8w4BMUTPHjxsAXC-qNiXg7Q.woff2
fonts.gstatic.com/s/lato/v16/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
step2.php
southerncaliforniapowerstrokes.com/chase/ |
1 KB 941 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
southerncaliforniapowerstrokes.com/chase/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
southerncaliforniapowerstrokes.com/chase/images/ |
52 KB 52 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.gif
southerncaliforniapowerstrokes.com/chase/images/ |
22 KB 23 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 618 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpeg
southerncaliforniapowerstrokes.com/chase/images/ |
386 KB 387 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d3b1ak9ylguumf.cloudfront.net
fonts.googleapis.com
fonts.gstatic.com
getstencil.com
southerncaliforniapowerstrokes.com
143.204.208.137
208.92.162.130
2606:4700:20::681a:484
2a00:1450:4001:809::200a
2a00:1450:4001:814::2003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