piratesinn.com.cy
Open in
urlscan Pro
2606:4700:3035::6818:61a1
Malicious Activity!
Public Scan
Effective URL: https://piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa/
Submission: On February 17 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on April 1st 2019. Valid for: a year.
This is the only time piratesinn.com.cy was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2600:9000:20e... 2600:9000:20eb:e00:19:9934:6a80:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 213.186.33.176 213.186.33.176 | 16276 (OVH) (OVH) | |
5 | 2606:4700:303... 2606:4700:3035::6818:61a1 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 4 |
ASN16276 (OVH, FR)
PTR: full-cdn-01.cluster020.hosting.ovh.net
artplak.fr |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
piratesinn.com.cy
piratesinn.com.cy |
68 KB |
2 |
artplak.fr
artplak.fr |
330 B |
1 |
app.link
mvha5.app.link |
1 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
5 | piratesinn.com.cy |
piratesinn.com.cy
|
2 | artplak.fr |
mvha5.app.link
|
1 | mvha5.app.link | |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
appipv4.link Amazon |
2019-08-19 - 2020-09-19 |
a year | crt.sh |
artplak.fr Let's Encrypt Authority X3 |
2020-01-23 - 2020-04-22 |
3 months | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-04-01 - 2020-04-01 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa/
Frame ID: F036CE777E133DC363682775F3390CC2
Requests: 8 HTTP requests in this frame
Frame:
https://artplak.fr/sites/Fidelity/SEC/AGf3qJDGFIqf38qfwf3aFIWEU/info/://open?link_click_id=757844531068219401
Frame ID: F1BA57184B1B9C8EB6EA896A5B7DD0F9
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://mvha5.app.link/S9GE68Zf63 Page URL
- https://artplak.fr/sites/Fidelity/SEC/AGf3qJDGFIqf38qfwf3aFIWEU/info/?_branch_match_id=75784453... Page URL
- https://piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- script /\/wp-(?:content|includes)\//i
Lua (Programming Languages) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
PHP (Programming Languages) Expand
Detected patterns
- script /\/wp-(?:content|includes)\//i
MySQL (Databases) Expand
Detected patterns
- script /\/wp-(?:content|includes)\//i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Amazon Web Services (PaaS) Expand
Detected patterns
- headers via /\(CloudFront\)$/i
Amazon Cloudfront (CDN) Expand
Detected patterns
- headers via /\(CloudFront\)$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://mvha5.app.link/S9GE68Zf63 Page URL
- https://artplak.fr/sites/Fidelity/SEC/AGf3qJDGFIqf38qfwf3aFIWEU/info/?_branch_match_id=757844531068219401&utm_medium=marketing Page URL
- https://piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
S9GE68Zf63
mvha5.app.link/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open
artplak.fr/sites/Fidelity/SEC/AGf3qJDGFIqf38qfwf3aFIWEU/info/:// Frame F1BA |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
artplak.fr/sites/Fidelity/SEC/AGf3qJDGFIqf38qfwf3aFIWEU/info/ |
104 B 330 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa/ |
550 B 799 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0b0oa5MwsS6tvMuZtJ2sw-NN-q0.js
piratesinn.com.cy/cdn-cgi/apps/head/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
captcha.js
piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa//assets/js/ |
123 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
FqCn1UcLFJeW5B0SzT6U1c5RWyk.js
piratesinn.com.cy/cdn-cgi/apps/body/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
captcha.png
piratesinn.com.cy/wp-includes/js/crop/Bo0o0o0o0ofa// |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| CloudflareApps function| setImmediate function| clearImmediate function| Vue2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
piratesinn.com.cy/ | Name: cazanova Value: i00dl0khsimmoisb9qcgcjs23aq34e3j |
|
.piratesinn.com.cy/ | Name: __cfduid Value: d9e6c4bbf2a5650422bf3e956f9889e581581922443 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
artplak.fr
mvha5.app.link
piratesinn.com.cy
213.186.33.176
2600:9000:20eb:e00:19:9934:6a80:93a1
2606:4700:3035::6818:61a1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