accessofindomesticweb.45-134-173-194.cprapid.com Open in urlscan Pro
45.134.173.194  Malicious Activity! Public Scan

Submitted URL: https://snip.ly/2gu7w6
Effective URL: https://accessofindomesticweb.45-134-173-194.cprapid.com/
Submission: On June 01 via api from US — Scanned from IT

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 5 HTTP transactions. The main IP is 45.134.173.194, located in Ukraine and belongs to YURTEH-AS, UA. The main domain is accessofindomesticweb.45-134-173-194.cprapid.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 23rd 2023. Valid for: 3 months.
This is the only time accessofindomesticweb.45-134-173-194.cprapid.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Findomestic (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:20:... 13335 (CLOUDFLAR...)
4 45.134.173.194 30860 (YURTEH-AS)
1 2606:4700::68... 13335 (CLOUDFLAR...)
5 2
Apex Domain
Subdomains
Transfer
4 cprapid.com
accessofindomesticweb.45-134-173-194.cprapid.com
101 KB
1 unpkg.com
unpkg.com — Cisco Umbrella Rank: 987
4 KB
1 snip.ly
snip.ly — Cisco Umbrella Rank: 403097
555 B
5 3
Domain Requested by
4 accessofindomesticweb.45-134-173-194.cprapid.com accessofindomesticweb.45-134-173-194.cprapid.com
1 unpkg.com accessofindomesticweb.45-134-173-194.cprapid.com
1 snip.ly 1 redirects
5 3

This site contains no links.

Subject Issuer Validity Valid
accessofindomesticweb.45-134-173-194.cprapid.com
cPanel, Inc. Certification Authority
2023-05-23 -
2023-08-21
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2023-05-02 -
2024-05-01
a year crt.sh

This page contains 1 frames:

Primary Page: https://accessofindomesticweb.45-134-173-194.cprapid.com/
Frame ID: B82609E79B897BDE5587E23BC080C058
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://snip.ly/2gu7w6 HTTP 302
    https://accessofindomesticweb.45-134-173-194.cprapid.com/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]+(?:([\d.])+/)?pure(?:-min)?\.css

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

5
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

105 kB
Transfer

116 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://snip.ly/2gu7w6 HTTP 302
    https://accessofindomesticweb.45-134-173-194.cprapid.com/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
accessofindomesticweb.45-134-173-194.cprapid.com/
Redirect Chain
  • https://snip.ly/2gu7w6
  • https://accessofindomesticweb.45-134-173-194.cprapid.com/
3 KB
4 KB
Document
General
Full URL
https://accessofindomesticweb.45-134-173-194.cprapid.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.134.173.194 , Ukraine, ASN30860 (YURTEH-AS, UA),
Reverse DNS
colleg.icu
Software
Apache /
Resource Hash
ac4c000142d5313e989399dfd210c0bd47ec362c2f2ed3415c98ee0177df49bc

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1
accept-language
it-IT,it;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Thu, 01 Jun 2023 16:43:43 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked

Redirect headers

cf-cache-status
DYNAMIC
cf-ray
7d08eac6b8530e79-MXP
content-type
text/html; charset=utf-8
date
Thu, 01 Jun 2023 16:43:43 GMT
location
https://accessofindomesticweb.45-134-173-194.cprapid.com/
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=lbYPWXk38ScfnCNlo2ST7XSODE%2FhmsDY%2B%2FrfKzEeNrBvQMOYVbkKEzM6QLiYdwwR%2BdgvJCYQZQbsHy1vjw7Elg7RzxV36iTNqnAMIk0vrt%2B0ChLZT8IX0%2F5fwKSP8dAFDHynuN0%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Cookie, Origin
logo.png
accessofindomesticweb.45-134-173-194.cprapid.com/
315 B
315 B
Image
General
Full URL
https://accessofindomesticweb.45-134-173-194.cprapid.com/logo.png
Requested by
Host: accessofindomesticweb.45-134-173-194.cprapid.com
URL: https://accessofindomesticweb.45-134-173-194.cprapid.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.134.173.194 , Ukraine, ASN30860 (YURTEH-AS, UA),
Reverse DNS
colleg.icu
Software
Apache /
Resource Hash
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

Request headers

accept-language
it-IT,it;q=0.9
Referer
https://accessofindomesticweb.45-134-173-194.cprapid.com/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

Date
Thu, 01 Jun 2023 16:43:43 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
315
Content-Type
text/html; charset=iso-8859-1
pure-min.css
unpkg.com/purecss@2.0.5/build/
16 KB
4 KB
Stylesheet
General
Full URL
https://unpkg.com/purecss@2.0.5/build/pure-min.css
Requested by
Host: accessofindomesticweb.45-134-173-194.cprapid.com
URL: https://accessofindomesticweb.45-134-173-194.cprapid.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7caf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2d0b11cc95b046dabdab9a5bbe9c3035d2db1d7036e644acbb9e00b7c639f3f6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
it-IT,it;q=0.9
Referer
https://accessofindomesticweb.45-134-173-194.cprapid.com/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

date
Thu, 01 Jun 2023 16:43:43 GMT
via
1.1 fly.io
x-content-type-options
nosniff
cf-cache-status
HIT
content-encoding
br
strict-transport-security
max-age=31536000; includeSubDomains; preload
age
5398333
last-modified
Sat, 26 Oct 1985 08:15:00 GMT
fly-request-id
01GWV17WYD0SVF3CVT3NJXT154-fra
server
cloudflare
etag
W/"4195-XLNKX4yxaMYG7+jslQdUA8knpHQ"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
cf-ray
7d08eacd5d4a59f5-MXP
jquery-latest.min.js
accessofindomesticweb.45-134-173-194.cprapid.com/
84 KB
84 KB
Script
General
Full URL
https://accessofindomesticweb.45-134-173-194.cprapid.com/jquery-latest.min.js
Requested by
Host: accessofindomesticweb.45-134-173-194.cprapid.com
URL: https://accessofindomesticweb.45-134-173-194.cprapid.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.134.173.194 , Ukraine, ASN30860 (YURTEH-AS, UA),
Reverse DNS
colleg.icu
Software
Apache /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

accept-language
it-IT,it;q=0.9
Referer
https://accessofindomesticweb.45-134-173-194.cprapid.com/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

Date
Thu, 01 Jun 2023 16:43:43 GMT
Last-Modified
Tue, 22 Feb 2022 22:46:42 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
85578
logo.svg
accessofindomesticweb.45-134-173-194.cprapid.com/
13 KB
13 KB
Image
General
Full URL
https://accessofindomesticweb.45-134-173-194.cprapid.com/logo.svg
Requested by
Host: accessofindomesticweb.45-134-173-194.cprapid.com
URL: https://accessofindomesticweb.45-134-173-194.cprapid.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.134.173.194 , Ukraine, ASN30860 (YURTEH-AS, UA),
Reverse DNS
colleg.icu
Software
Apache /
Resource Hash
c020a8fe3af3974d4bf687ff0f2f676bb08485586318dc6ae4b0c9387d9b9a40

Request headers

accept-language
it-IT,it;q=0.9
Referer
https://accessofindomesticweb.45-134-173-194.cprapid.com/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

Date
Thu, 01 Jun 2023 16:43:43 GMT
Last-Modified
Thu, 07 Jan 2021 22:23:36 GMT
Server
Apache
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
12939

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Findomestic (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend function| $ function| jQuery

2 Cookies

Domain/Path Name / Value
snip.ly/ Name: sessionid
Value: 2ac7zqs32rodlmiu6bpmf5m0j2z6eoc1
accessofindomesticweb.45-134-173-194.cprapid.com/ Name: COOKIE_KEY
Value: 168563782366

1 Console Messages

Source Level URL
Text
network error URL: https://accessofindomesticweb.45-134-173-194.cprapid.com/logo.png
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)