denver-dev.tk
Open in
urlscan Pro
162.240.234.31
Malicious Activity!
Public Scan
Submission Tags: tweet @atomspam #phishing #bancosantander #santander #bank #infosec #cybersecurity #atomspam Search All
Submission: On April 10 via api from FI — Scanned from FI
Summary
This is the only time denver-dev.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 162.240.234.31 162.240.234.31 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
12 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 6806351.bhnilton.ga
denver-dev.tk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
denver-dev.tk
denver-dev.tk |
993 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 756 |
33 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
11 | denver-dev.tk |
denver-dev.tk
|
1 | code.jquery.com |
denver-dev.tk
|
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://denver-dev.tk/
Frame ID: B75B0A46FA9ED48801FB48ABF9D73EA3
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
denver-dev.tk/ |
63 KB 63 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.12.4.min.js
code.jquery.com/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-pincode-autotab.css
denver-dev.tk/ |
265 B 532 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-pincode-autotab.min.js
denver-dev.tk/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.30ce9a6d1e58e20411b6.css
denver-dev.tk/Home%20Banking_files/ |
105 KB 105 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s.cpbto
denver-dev.tk/Home%20Banking_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cc2m_night2.jpg
denver-dev.tk/ |
643 KB 643 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderHeadlineW05-Rg.9f3fc5d2724d101218a0.woff2
denver-dev.tk/Home%20Banking_files/ |
33 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderTextW05-Regular.e06575482dfb4f5ce0cb.woff2
denver-dev.tk/Home%20Banking_files/ |
34 KB 34 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SantanderTextW05-Bold.e0d7033809f586a71b1c.woff2
denver-dev.tk/Home%20Banking_files/ |
35 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
san-icon.10405e3d0e04a65cd84d.woff2
denver-dev.tk/Home%20Banking_files/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico3.91e24b3fe5365cff1848.woff2
denver-dev.tk/Home%20Banking_files/ |
68 KB 68 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery string| valore1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
denver-dev.tk/ | Name: COOKIE_KEY Value: 168111179690 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
denver-dev.tk
162.240.234.31
2001:4de0:ac18::1:a:3a
23d7ec5b376b92e2d0e2b483846c2938b03250fb253af07a1354206718076269
3ed4606acf5b41ffe0d3fbc4eb9f84ad79d9c8b7a6e0007896667fd6359f541c
4b84418da443bc9a1497df28bc5ed641fcc8c0f5c0052cf85f8e6321b0b30789
63c8882207a7f3e1ee6e8bc517102398d5441cba428fabbd2cdb578e63551862
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
8dc23ac1fc1a2d9fe17d4f8d70514a302c1d686b0c06ef9b4c3ec34ca593c1d3
aa6e0a9667852f86282460aa3848dbae46e288b447a02369c89c70f0bfe25a35
b8c9e126d6239234ecac3acea24620d0c8ee71ba72509e58cc72aadb4aa73a54
c9f7e218b19e6c3c3db1e54d5a876309f95ce695c3cc8bc5d0b16513fc88baae
d6e395ef50c1564cf0f11e41a5a4ed81589b403c5a73177735d51cb1ffcfb852
e69dcb36c97e11b9ce1b1a39cc9070e44185eeb4611fd39706943ef1ea53d287