www.sa.apic.edu.tw
Open in
urlscan Pro
140.126.112.178
Malicious Activity!
Public Scan
Submission: On May 27 via automatic, source openphish
Summary
This is the only time www.sa.apic.edu.tw was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: TSB Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 140.126.112.178 140.126.112.178 | 1659 (ERX-TANET...) (ERX-TANET-ASN1 Taiwan Academic Network (TANet) Information Center) | |
10 | 1 |
ASN1659 (ERX-TANET-ASN1 Taiwan Academic Network (TANet) Information Center, TW)
PTR: www.sa.apic.edu.tw
www.sa.apic.edu.tw |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
apic.edu.tw
www.sa.apic.edu.tw |
155 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.sa.apic.edu.tw |
www.sa.apic.edu.tw
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.sa.apic.edu.tw/devil/
Frame ID: EFA7DCB2DFD958EE0A3987D1A63401C6
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Fedora (Operating Systems) Expand
Detected patterns
- headers server /Fedora/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.sa.apic.edu.tw/devil/ |
9 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile.css
www.sa.apic.edu.tw/devil/assets/css/ |
61 KB 61 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
official.gif
www.sa.apic.edu.tw/devil/assets/img/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lock.png
www.sa.apic.edu.tw/devil/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ad1.gif
www.sa.apic.edu.tw/devil/assets/img/ |
9 KB 9 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ad2.jpg
www.sa.apic.edu.tw/devil/assets/img/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global_2.js
www.sa.apic.edu.tw/devil/assets/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
right.png
www.sa.apic.edu.tw/devil/assets/img/ |
373 B 669 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
basic_light.woff
www.sa.apic.edu.tw/devil/assets/fonts/ |
54 KB 55 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global_2.js
www.sa.apic.edu.tw/devil/assets/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: TSB Bank (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| DntWantMobile0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.sa.apic.edu.tw
140.126.112.178
2770f5093ab114709b4cf6066ce8fd6f88f07e6ddcc96f650c74e661c838b7dc
783311a83d6806e728bed51e2969c166978d5a53e46ef50f309eb8daafc16bf2
a634c5241ca3c7bcc29b263ee32ed68539b929b0b16e5255ca792714b9af689a
be1f97e8e72900fd659456d079a8774251f0b9b2955997190bec58e9a739cea2
cad08a1998ce400337863ee1bd2fa5fc890da31c4e3c6a3dee58d33be6ab398f
d60d5575a65d9380d9ad37584a751b7b0f9da16af87f95584014395878ea230d
e31848823c5d1fd952b7d320715d15ca1cc572186d14ae437cdc4cc37a080f15
fa7e9693e9c19e6c4128b8e7d370966afef67f58eb5065b3c4d2bbd0f8db9df7