pagamento.cf
Open in
urlscan Pro
2606:4700:30::6812:2fd3
Malicious Activity!
Public Scan
Submission: On July 15 via automatic, source openphish
Summary
This is the only time pagamento.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:30:... 2606:4700:30::6812:2fd3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
7 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
pagamento.cf |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
pagamento.cf
pagamento.cf |
86 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
7 | pagamento.cf |
pagamento.cf
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://pagamento.cf/index2.php?page=chorme.10,25,15KQHlG9hLlru2lk12FWzrHzgFslFzFK1HW94TfDTQEltWrjjT56yrywq1GRkgyygd3PPy5fuDSgE5FzWWQQWyFcd7uySB4R7lajsP
Frame ID: D7DEB9759B68378F7D9B248BC1B8C386
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
index2.php
pagamento.cf/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
pagamento.cf/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
01.png
pagamento.cf/pictures/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
02.png
pagamento.cf/pictures/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
03.png
pagamento.cf/pictures/ |
496 B 900 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
06.png
pagamento.cf/pictures/ |
564 B 968 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
04.png
pagamento.cf/pictures/ |
45 KB 45 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| validar_dados1 function| validar_dados2 function| validar_dados3 function| pulacampo function| SomenteNumero1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pagamento.cf/ | Name: __cfduid Value: da958c439a2ac66dd132fcca8374d88ee1563188689 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pagamento.cf
2606:4700:30::6812:2fd3
5b1ba27de53e11e2a80751ab9c56f7aaabf3279ee0c4b3e6208a29fd34b6c180
8c841ad8edd8c940a5bdbce8f35f54a2276daa4ee67fa9edb75d607dd7167f57
973576ba6483c6c75d1d55339c1cac5d742abef700ede0903341ab222a2ee7c2
ac012672fbde51005e33556de5ea06dc805a2065b7cbe91bd8f275c3cd995d67
b68be0ce0f3911c70fe492eb16445c3f319eebb84b38131a4be8a383acf8f11d
c1fe4aa08586c1d95ad0b9f4a1e980a7be19c7c3f654cda993a158b52966bf33
e2e3f2c478b4bec41cf2f2dc9866643ffc7c314672ec00f71a241a38a944ac73