intranet.ugel01.gob.pe
Open in
urlscan Pro
2606:4700:3031::681c:505
Malicious Activity!
Public Scan
Submission: On September 12 via api from TW
Summary
This is the only time intranet.ugel01.gob.pe was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fibank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 20 | 2606:4700:303... 2606:4700:3031::681c:505 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
19 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
ugel01.gob.pe
1 redirects
intranet.ugel01.gob.pe |
61 KB |
19 | 1 |
Domain | Requested by | |
---|---|---|
20 | intranet.ugel01.gob.pe |
1 redirects
intranet.ugel01.gob.pe
|
19 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
webgate.ec.europa.eu |
www.thawte.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/
Frame ID: 973DE199B262D9D16199046C7ED52CFE
Requests: 19 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account
HTTP 301
http://intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Онлайн решаване на спорове
Search URL Search Domain Scan URL
Title: SSL сертификат
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account
HTTP 301
http://intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/ Redirect Chain
|
22 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/css/ |
178 KB 33 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email-decode.min.js
intranet.ugel01.gob.pe/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_logo_thatwe.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bgr-logo-en.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_to_site.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
364 B 364 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_app_full.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
365 B 365 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_tariff_changes.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
371 B 371 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_help.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
361 B 361 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_user_normal.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
368 B 368 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_password.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
365 B 365 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_security_advice.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_arrow_right_4x7.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_faq.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
360 B 360 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_arrow_right_5x8.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_phone.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
362 B 362 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_mail.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
361 B 361 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_offices.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
364 B 364 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ic_atm.png
intranet.ugel01.gob.pe/capacitacion/blocks/attendance/fibank__eliminado/account/images/ |
360 B 360 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fibank (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.ugel01.gob.pe/ | Name: __cfduid Value: df108c033cfd6f7d57973a6ce486d3b6e1599871552 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
intranet.ugel01.gob.pe
2606:4700:3031::681c:505
086fb7fe8db0dfee0a1ee58a093ef41250db5731093b83f4d205f85512679942
0fa7785d913f305d024e9278f6776d26ed7d76ea33a6302335c04c70872da3e0
1d35cdc369337821eedf9e78e8b3f769c4d15c0acfab43c56cbae4f656b2a753
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
32aff8d5b152917ccb213e8726e1f43fedd27eb3a05e1efc6758cd266ea5dbcb
3564619745e4b6c7cd540580963fefbc4797622193745a54435c6ea0b4fd5559
3a83d46379b1e1073c2a2bec14d7004e39c3075c06553bbfeb58a068761ccf73
5b561fcbe30a05fdba4dd7c376497168ae043cb40b4fd9a4814e0db9487333f6
631e21658141c925befe403629914e8e22e084a3cfe838c6829bb091d07d62d7
69c833b21ef50370e70c6167b0043ff97d0312cab466c3a9a7482093610a1dc4
718a65cb6a6c9597b9dc032178dd2d0ef903a64c0a818fc3f6dd5258bf958b0b
72b1737c32b72e04824fb988d8fd588a2850a06da4fd7c776a3e571e6982599b
7f48efa486c0e14e1e0aa9a508950f35930210223870d36f63371e4121a69740
b87393023362b5e845eebaa55913b17a09b62f8039c491ee233118968bd2f42d
c3ef93a67a4354c25983be50297a25bfa1e296fd5b722ec63d954e335c3b2ff6
c417c1ae18f4bd69447a864a1bc16759b7ad14cbc9e97086e2701a215b9a7179
c880fdbfca5759e4d88e33b6ab573f3a6fcaff6cda6c6d47165f0d0c16d52b4b
de54343b50a804c4e70c96a9bf631cb534f9f77497025866dc210bedd01db250
ef483122ce247a1e0610d03407661f22583a4518c01fc7727be00599a3095f71