Submitted URL: http://qwe-foposhadbank.sbs/
Effective URL: https://qwe-foposhadbank.sbs/
Submission Tags: @ecarlesi possiblethreat Search All
Submission: On November 29 via api from IT — Scanned from IT

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 172.67.140.216, located in United States and belongs to CLOUDFLARENET, US. The main domain is qwe-foposhadbank.sbs.
TLS certificate: Issued by WE1 on November 28th 2024. Valid for: 3 months.
This is the only time qwe-foposhadbank.sbs was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 172.67.140.216 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
1 qwe-foposhadbank.sbs
qwe-foposhadbank.sbs
1 1
Domain Requested by
1 qwe-foposhadbank.sbs
1 1

This site contains no links.

Subject Issuer Validity Valid
qwe-foposhadbank.sbs
WE1
2024-11-28 -
2025-02-26
3 months crt.sh

This page contains 1 frames:

Primary Page: https://qwe-foposhadbank.sbs/
Frame ID: 4EC95E4F7BB43D715F60851AA2CF1454
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

qwe-foposhadbank.sbs

Page URL History Show full URLs

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

0 kB
Transfer

8 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
qwe-foposhadbank.sbs/
Redirect Chain
  • http://qwe-foposhadbank.sbs/
  • https://qwe-foposhadbank.sbs/
0
0
Document
General
Full URL
https://qwe-foposhadbank.sbs/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.140.216 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-origin
*
alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
8ea0d67eeefba040-FRA
date
Fri, 29 Nov 2024 07:20:54 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FG8cCyFUKsWxl6zT3CLOSPbwu6SjWiU5xj%2BRMVdCMW655%2FqH3FJQ8inqMAPUwJYuNKRVpJsJi3b1EgT3qd7L2S7i3JbJ2Ssb0mUzmZtwtq%2FMgAdq2zCbZ%2FkEBwZqXqb%2BuEKIwx53Uw%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=30132&min_rtt=29324&rtt_var=9470&sent=7&recv=8&lost=0&retrans=0&sent_bytes=3973&recv_bytes=2261&delivery_rate=108466&cwnd=253&unsent_bytes=0&cid=9f20efdd57eb5c3c&ts=214&x=0"
x-powered-by
Express

Redirect headers

Location
https://qwe-foposhadbank.sbs/
Non-Authoritative-Reason
HttpsUpgrades
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
155 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

36 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| onResize function| setupMobileNav function| assert function| getRandomNum function| getTimeStamp function| CollisionBox function| Runner function| announcePhrase function| getA11yString function| vibrate function| createCanvas function| decodeBase64ToArrayBuffer function| checkForCollision function| createAdjustedCollisionBox function| boxCompare function| toggleHelpBox function| diagnoseErrors function| portalSignin function| updateForDnsProbe function| updateIconClass function| reloadButtonClick function| downloadButtonClick function| detailsButtonClick function| setAutoFetchState function| savePageLaterClick function| cancelSavePageClick function| toggleErrorInformationPopup function| launchDownloadsPage function| toggleOfflineContentListVisibility function| onDocumentLoadOrUpdate function| onDocumentLoad function| jstGetTemplate function| JsEvalContext function| jstProcess object| loadTimeDataRaw object| errorPageController

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: chrome-error://chromewebdata/
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

qwe-foposhadbank.sbs
172.67.140.216
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2