142.234.157.210
Open in
urlscan Pro
142.234.157.210
Malicious Activity!
Public Scan
Effective URL: http://142.234.157.210/
Submission: On January 22 via manual from ES
Summary
This is the only time 142.234.157.210 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banque Postale (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.114.196.48 167.114.196.48 | 16276 (OVH) (OVH) | |
4 | 142.234.157.210 142.234.157.210 | 395954 (LEASEWEB-...) (LEASEWEB-USA-LAX-11 - Leaseweb USA) | |
2 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2606:4700::68... 2606:4700::6813:c597 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
7 | 3 |
ASN16276 (OVH, FR)
PTR: minhaempresa2.ddnsai.com
minhaempresa2.ddnsai.com |
ASN395954 (LEASEWEB-USA-LAX-11 - Leaseweb USA, Inc., US)
142.234.157.210 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
googleapis.com
fonts.googleapis.com |
944 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
20 KB |
1 |
ddnsai.com
1 redirects
minhaempresa2.ddnsai.com |
261 B |
7 | 3 |
Domain | Requested by | |
---|---|---|
2 | fonts.googleapis.com |
142.234.157.210
|
1 | cdnjs.cloudflare.com |
142.234.157.210
|
1 | minhaempresa2.ddnsai.com | 1 redirects |
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2018-12-19 - 2019-03-13 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-09-22 - 2019-03-31 |
6 months | crt.sh |
This page contains 2 frames:
Primary Page:
http://142.234.157.210/
Frame ID: 7BE31F9195674C74EDEFC09B6278E28A
Requests: 5 HTTP requests in this frame
Frame:
http://142.234.157.210/Iframes/00prt,,0.html
Frame ID: 66715BC7FA64F7D5157BAE8BB1135379
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://minhaempresa2.ddnsai.com/minhaempresa2/link.php?M=17856&N=2&L=1&F=H
HTTP 302
http://142.234.157.210/ Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Materialize CSS (Web Frameworks) Expand
Detected patterns
- html /<link[^>]* href="[^"]*materialize(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- html /<link[^>]* href="[^"]*materialize(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://minhaempresa2.ddnsai.com/minhaempresa2/link.php?M=17856&N=2&L=1&F=H
HTTP 302
http://142.234.157.210/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
142.234.157.210/ Redirect Chain
|
1 KB 870 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index-login.css
142.234.157.210/responsive-design/css/ |
1 KB 791 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_bpi.png
142.234.157.210/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon
fonts.googleapis.com/ |
574 B 430 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
materialize.min.css
cdnjs.cloudflare.com/ajax/libs/materialize/1.0.0/css/ |
139 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
00prt,,0.html
142.234.157.210/Iframes/ Frame 6671 |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ Frame 6671 |
1 KB 514 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banque Postale (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
minhaempresa2.ddnsai.com
142.234.157.210
167.114.196.48
2606:4700::6813:c597
2a00:1450:4001:820::200a
1e1adb7415ae9ab569e586b2f57100a481a14cf0028baf7315564795b31739e0
3b079a3ff21ceabb15fa5cac7f24b887e2cceac470b8eddeb9361fafa335db88
74623235a4212eb98f42b909bd802f233f646872b61e2158aad50ad5fcaad371
8695daa10500afd07e8b0bf27a567b0d5b54b8aaae4ff8832a00bf517ce3f8de
8b88f46ae14d109907a80437dccd1d8f88607a585c77b69a6a566083d340a602
95aa5d7610a2629577f22b69790b101719fa9083d6f767dd6dbe516413fb5b9a
cb9161d92f953886de19a52fc4e81cd12c7312260ee644feb0b837e11035fed2