www.powernetmg.com.br
Open in
urlscan Pro
192.185.177.11
Malicious Activity!
Public Scan
Submission: On February 08 via automatic, source phishtank
Summary
This is the only time www.powernetmg.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 192.185.177.11 192.185.177.11 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
10 | 1 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: br186-ip02.hostgator.com.br
www.powernetmg.com.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
powernetmg.com.br
www.powernetmg.com.br |
160 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.powernetmg.com.br |
www.powernetmg.com.br
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.powernetmg.com.br/modulodeseguranca2016/index1.php
Frame ID: 22996.1
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index1.php
www.powernetmg.com.br/modulodeseguranca2016/ |
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts_campos.js
www.powernetmg.com.br/modulodeseguranca2016/scripts/ |
4 KB 822 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pular_campos.js
www.powernetmg.com.br/modulodeseguranca2016/scripts/ |
234 B 168 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
somente_numeros.js
www.powernetmg.com.br/modulodeseguranca2016/scripts/ |
200 B 157 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script_data.js
www.powernetmg.com.br/modulodeseguranca2016/scripts/ |
889 B 392 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7.png
www.powernetmg.com.br/modulodeseguranca2016/images/ |
67 KB 67 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9.png
www.powernetmg.com.br/modulodeseguranca2016/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.gif
www.powernetmg.com.br/modulodeseguranca2016/images/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
www.powernetmg.com.br/modulodeseguranca2016/images/ |
86 KB 86 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
www.powernetmg.com.br/ |
0 0 |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.powernetmg.com.br
192.185.177.11
05c36da200dca6f96cb0183fcaf5fba25d53b2233f69371a76eaabcec0c3b99a
0d6508713105f7d8bb2ee2d8e60fb057578f90ab6f516c3e2f646dca7fb5bdd5
299985cb46aee092002b0126d8acee4eb698ffc13454761dc66fa608c3f3d5be
985718c35c10a8246bb0753b5390172f72f77dc08f54485c185773cf1f8dbe93
c2a9b332c7752e4a4599e020485e494484a3674d7f95ec129e88cbf4e9824bdf
c4e80f61e1d4943f8a857f330b2d38bdcf541a424dc7f4c9e13fc8bf56bffe99
c8137bc75fc6f711e8b4eacb62d821a0695af8ff441d71bdaff942185350127f
e1c116b479b8bda2dfe4b18d85f58b60ffdf08dd98ed52eb5a8f9bd156769d2c
fdc2bddc55002910e67edf99e9ba7ba59387d40107484380d7071a7227f5700d