digitalitaubafa.xyz
Open in
urlscan Pro
185.213.81.108
Malicious Activity!
Public Scan
Effective URL: https://digitalitaubafa.xyz/
Submission: On March 30 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on March 28th 2022. Valid for: 3 months.
This is the only time digitalitaubafa.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Magazine Luiza (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 185.213.81.108 185.213.81.108 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 | 2404:6800:400... 2404:6800:4004:820::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 23.45.60.145 23.45.60.145 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 2404:6800:400... 2404:6800:4004:821::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 4 |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-45-60-145.deploy.static.akamaitechnologies.com
www.itau.com.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
digitalitaubafa.xyz
1 redirects
digitalitaubafa.xyz |
36 KB |
2 |
gstatic.com
fonts.gstatic.com |
39 KB |
1 |
itau.com.br
www.itau.com.br — Cisco Umbrella Rank: 16375 |
6 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 107 |
1 KB |
9 | 4 |
Domain | Requested by | |
---|---|---|
6 | digitalitaubafa.xyz |
1 redirects
digitalitaubafa.xyz
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | www.itau.com.br |
digitalitaubafa.xyz
|
1 | fonts.googleapis.com |
digitalitaubafa.xyz
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
digitalitaubafa.xyz ZeroSSL RSA Domain Secure Site CA |
2022-03-28 - 2022-06-26 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-03-17 - 2022-06-09 |
3 months | crt.sh |
www.itau.com.br DigiCert SHA2 Extended Validation Server CA |
2020-03-12 - 2022-06-11 |
2 years | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-03-17 - 2022-06-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://digitalitaubafa.xyz/
Frame ID: 5908AF13EA623955E9B4B1A7986A3D9D
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
MagaluPage URL History Show full URLs
-
http://digitalitaubafa.xyz/
HTTP 301
https://digitalitaubafa.xyz/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://digitalitaubafa.xyz/
HTTP 301
https://digitalitaubafa.xyz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
digitalitaubafa.xyz/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
8 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
magalu-logo.png
www.itau.com.br/content/dam/itau/cartoes/magalu/ |
5 KB 6 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.js
digitalitaubafa.xyz/js/ |
101 KB 15 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
padrao_mk.js
digitalitaubafa.xyz/js/ |
2 KB 801 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cpf.js
digitalitaubafa.xyz/js/ |
2 KB 724 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
card.js
digitalitaubafa.xyz/js/ |
96 KB 17 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmSU5fBBc4.woff2
fonts.gstatic.com/s/roboto/v29/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v22/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Magazine Luiza (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| mascaraMike function| pulacampo function| SomenteNumero function| checkCPF function| ucfirst function| card function| Payment function| Card1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
digitalitaubafa.xyz/ | Name: PHPSESSID Value: 9dc6baa70b7bf4d48db3d486c5fb713d |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
digitalitaubafa.xyz
fonts.googleapis.com
fonts.gstatic.com
www.itau.com.br
185.213.81.108
23.45.60.145
2404:6800:4004:820::200a
2404:6800:4004:821::2003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