equiponet.hstn.me
Open in
urlscan Pro
185.27.134.215
Malicious Activity!
Public Scan
Effective URL: http://equiponet.hstn.me/index1.html
Submission: On February 19 via manual from UY — Scanned from DE
Summary
This is the only time equiponet.hstn.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la República Oriental del Uruguay (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 208.91.199.108 208.91.199.108 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 16 | 185.27.134.215 185.27.134.215 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
16 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 208-91-199-108.unifiedlayer.com
makeyoursolution.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
hstn.me
1 redirects
equiponet.hstn.me |
758 KB |
1 |
makeyoursolution.com
makeyoursolution.com |
184 B |
16 | 2 |
Domain | Requested by | |
---|---|---|
16 | equiponet.hstn.me |
1 redirects
equiponet.hstn.me
|
1 | makeyoursolution.com | |
16 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.makeyoursolution.com R3 |
2024-02-19 - 2024-05-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://equiponet.hstn.me/index1.html
Frame ID: 290F7F5C144B56363EB59CF10FBB3A33
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
InicioPage URL History Show full URLs
- https://makeyoursolution.com/wp-admin/images/ Page URL
- http://equiponet.hstn.me/ Page URL
-
http://equiponet.hstn.me/?i=1
HTTP 302
http://equiponet.hstn.me/index1.html Page URL
Detected technologies
Ionicons (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+ionicons(?:\.min)?\.css
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://makeyoursolution.com/wp-admin/images/ Page URL
- http://equiponet.hstn.me/ Page URL
-
http://equiponet.hstn.me/?i=1
HTTP 302
http://equiponet.hstn.me/index1.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
makeyoursolution.com/wp-admin/images/ |
72 B 184 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
equiponet.hstn.me/ |
828 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aes.js
equiponet.hstn.me/ |
13 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index1.html
equiponet.hstn.me/ Redirect Chain
|
25 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
equiponet.hstn.me/flfs/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ionicons.css
equiponet.hstn.me/flfs/ |
59 KB 59 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.d18bb301.chunk.css
equiponet.hstn.me/flfs/ |
34 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.8d29879f.chunk.css
equiponet.hstn.me/flfs/ |
528 KB 528 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slider-01.jpg
equiponet.hstn.me/flfs/ |
94 KB 94 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selectArrowDown.b3a49a7d.svg
equiponet.hstn.me/frontend/static/media/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GothamBook.woff2
equiponet.hstn.me/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Gotham-Medium.woff2
equiponet.hstn.me/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GothamBook.woff
equiponet.hstn.me/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Gotham-Medium.woff
equiponet.hstn.me/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GothamBook.ttf
equiponet.hstn.me/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Gotham-Medium.ttf
equiponet.hstn.me/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la República Oriental del Uruguay (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
equiponet.hstn.me/ | Name: __test Value: 73a7a82180d1a1edc8e234d7587fe57c |
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
equiponet.hstn.me
makeyoursolution.com
185.27.134.215
208.91.199.108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