c1731124.ferozo.com
Open in
urlscan Pro
2800:6c0:2::95
Malicious Activity!
Public Scan
Submission: On February 22 via automatic, source openphish
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on February 20th 2020. Valid for: 2 years.
This is the only time c1731124.ferozo.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 2800:6c0:2::95 2800:6c0:2::95 | 27823 (Dattatec.com) (Dattatec.com) | |
14 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
ferozo.com
c1731124.ferozo.com |
517 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | c1731124.ferozo.com |
c1731124.ferozo.com
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
c1731124.ferozo.com Sectigo RSA Domain Validation Secure Server CA |
2020-02-20 - 2022-02-19 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/particulares
Frame ID: 51ADD8DFE3984092DEC7F91A0C933D6C
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- script /angular.*\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
particulares
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/ |
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.a5beaad1.css
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
314 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
angular.min.js
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style/js/ |
163 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style/js/ |
286 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.validate.min.js
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style/js/ |
49 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style/js/ |
18 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smarbannerimg.png
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/images/ |
196 B 196 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spring_afternoon_p.jpg
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style/ |
93 KB 94 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico3.ttf
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
41 KB 42 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico.ttf
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
27 KB 28 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Lato-Regular.woff
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
37 KB 37 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Lato-Light.woff
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
35 KB 35 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Lato-Semibold.woff
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
38 KB 38 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Lato-Bold.woff
c1731124.ferozo.com/wp-includes/ID3/643TY348T734TY348Y34R7/style// |
36 KB 36 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| angular function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
c1731124.ferozo.com
2800:6c0:2::95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