a0370306.xsph.ru
Open in
urlscan Pro
2a0a:2b43:1b6:641d::
Malicious Activity!
Public Scan
Submission Tags: 6307883
Submission: On December 05 via api from JP
Summary
This is the only time a0370306.xsph.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banca Sella (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2a0a:2b43:1b6... 2a0a:2b43:1b6:641d:: | 35278 (SPRINTHOST) (SPRINTHOST) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
xsph.ru
a0370306.xsph.ru |
25 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | a0370306.xsph.ru |
a0370306.xsph.ru
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/
Frame ID: A47EA294E505E0CEF54EB0E5C4B9318E
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-oui.css
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
28 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
art.css
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
16 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Browser.css
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BSEPAGAM.svg
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
language_it.svg
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
752 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_arrowhead_progressBar_finished.svg
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_arrowhead_progressBar_now.svg
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_arrowhead_progressBar_next.svg
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
space.gif
a0370306.xsph.ru/fatturazione-staff/2e2302241f06f58/fatturazione/ |
43 B 347 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_arrowhead_main.svg
a0370306.xsph.ru/fatturazione-staff/images/ |
365 B 365 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ico_arrowhead_back.svg
a0370306.xsph.ru/fatturazione-staff/images/ |
365 B 365 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banca Sella (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a0370306.xsph.ru
2a0a:2b43:1b6:641d::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