grupogiezi.com Open in urlscan Pro
165.227.124.226  Malicious Activity! Public Scan

Submitted URL: https://ro-ar.com.au/fsddfss
Effective URL: https://grupogiezi.com/cgi-sys/suspendedpage.cgi
Submission: On November 07 via manual from AU — Scanned from AU

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 165.227.124.226, located in Clifton, United States and belongs to DIGITALOCEAN-ASN, US. The main domain is grupogiezi.com.
TLS certificate: Issued by AlphaSSL CA - SHA256 - G4 on February 23rd 2023. Valid for: a year.
This is the only time grupogiezi.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Community Verdicts: Malicious1 votes Show Verdicts

Domain & IP information

IP Address AS Autonomous System
1 1 43.250.142.148 45638 (SYNERGYWH...)
1 2 165.227.124.226 14061 (DIGITALOC...)
2 172.67.142.245 13335 (CLOUDFLAR...)
3 3
Apex Domain
Subdomains
Transfer
2 fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1002
46 KB
2 grupogiezi.com
grupogiezi.com
8 KB
1 ro-ar.com.au
ro-ar.com.au
223 B
3 3
Domain Requested by
2 use.fontawesome.com grupogiezi.com
use.fontawesome.com
2 grupogiezi.com 1 redirects
1 ro-ar.com.au 1 redirects
3 3

This site contains no links.

Subject Issuer Validity Valid
www.grupogiezi.com
AlphaSSL CA - SHA256 - G4
2023-02-23 -
2024-03-26
a year crt.sh
use.fontawesome.com
Cloudflare Inc ECC CA-3
2023-10-12 -
2024-10-10
a year crt.sh

This page contains 1 frames:

Primary Page: https://grupogiezi.com/cgi-sys/suspendedpage.cgi
Frame ID: 1F433E8BC957C02681AE379308FB82A9
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Account Suspended

Page URL History Show full URLs

  1. https://ro-ar.com.au/fsddfss HTTP 301
    https://grupogiezi.com/login HTTP 302
    https://grupogiezi.com/cgi-sys/suspendedpage.cgi Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

54 kB
Transfer

82 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://ro-ar.com.au/fsddfss HTTP 301
    https://grupogiezi.com/login HTTP 302
    https://grupogiezi.com/cgi-sys/suspendedpage.cgi Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request suspendedpage.cgi
grupogiezi.com/cgi-sys/
Redirect Chain
  • https://ro-ar.com.au/fsddfss
  • https://grupogiezi.com/login
  • https://grupogiezi.com/cgi-sys/suspendedpage.cgi
7 KB
8 KB
Document
General
Full URL
https://grupogiezi.com/cgi-sys/suspendedpage.cgi
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
165.227.124.226 Clifton, United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
xpcp19005.xpress.com.mx
Software
Apache /
Resource Hash
18cd9aa226c0bc8a9ce9a99cf8fee5c4d7f2b3354686ddedf4722b955a8c95a9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html
Date
Tue, 07 Nov 2023 22:35:28 GMT
Keep-Alive
timeout=5, max=99
Server
Apache
Transfer-Encoding
chunked

Redirect headers

Connection
Keep-Alive
Content-Length
232
Content-Type
text/html; charset=iso-8859-1
Date
Tue, 07 Nov 2023 22:35:28 GMT
Keep-Alive
timeout=5, max=100
Location
https://grupogiezi.com/cgi-sys/suspendedpage.cgi
Server
Apache
all.css
use.fontawesome.com/releases/v5.0.6/css/
34 KB
8 KB
Stylesheet
General
Full URL
https://use.fontawesome.com/releases/v5.0.6/css/all.css
Requested by
Host: grupogiezi.com
URL: https://grupogiezi.com/cgi-sys/suspendedpage.cgi
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.142.245 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ed0f122470c4d13d86bbabdc38046d743d0228204a56d786d2e17bd83fd358ce

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://grupogiezi.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

date
Tue, 07 Nov 2023 22:35:29 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 22 Sep 2023 01:44:11 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
age
695403
etag
W/"42eaa52604673b64d6b356c2fd7f87e3"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=oUgWINDQ7GsL1PVyVfg8tFkKMrGe4qkZWLpNkgLKfPsacdp6epLatn3iByWCXKODxpzuDQxkx3Jab7PDV2vrItG%2B%2FnbT77ZNdQopKziLuTHENUOHb%2BttdDat8c%2Fk95winz8EicVe"}],"group":"cf-nel","max_age":604800}
content-type
text/css
cache-control
max-age=31556926
cf-ray
82290cb249982d50-PER
alt-svc
h3=":443"; ma=86400
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bf54538a1951e9e4ed0b407ffbed2583fd441fcc087da5c6657a0cde6d0c0208

Request headers

accept-language
en-AU,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

Content-Type
image/png
fa-solid-900.woff2
use.fontawesome.com/releases/v5.0.6/webfonts/
38 KB
38 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.0.6/webfonts/fa-solid-900.woff2
Requested by
Host: use.fontawesome.com
URL: https://use.fontawesome.com/releases/v5.0.6/css/all.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.142.245 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
62554277d07b20c6bfae7c6267b3198b4846f604a37d4085bf9f54c392210b56

Request headers

Referer
https://use.fontawesome.com/releases/v5.0.6/css/all.css
Origin
https://grupogiezi.com
accept-language
en-AU,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.105 Safari/537.36

Response headers

date
Tue, 07 Nov 2023 22:35:29 GMT
cf-cache-status
MISS
last-modified
Fri, 22 Sep 2023 01:44:10 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
etag
"f9b85c9463af7103b9b24bbbf09a06ed"
vary
Origin, Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=JB%2FRIXarv1sLR1bVDgqzGrImaNGSYnmMyf%2B%2B5h%2FqeZazKTdzEYdccYSMKqJlm5XOOjr%2BzqGlhvVa%2BabRDbs%2BT%2BYeu4ZsndAPXP4zqzhTVGaIy4lrEYokt%2FHO3vSAyPU9GcgFmLOs"}],"group":"cf-nel","max_age":604800}
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
max-age=31556926
accept-ranges
bytes
cf-ray
82290cb36885fb65-PER
alt-svc
h3=":443"; ma=86400
content-length
38784

Verdicts & Comments Add Verdict or Comment


Malicious task.url
Submitted on November 7th 2023, 10:38:20 pm UTC — From Australia

Threats: Phishing
Brands: Bendigo Bank AU
Comment: confirmed email phishing url targeting bendigo bank

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies