test.hackathonbbva.com
Open in
urlscan Pro
174.138.61.56
Malicious Activity!
Public Scan
Submission: On August 05 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 29th 2019. Valid for: 3 months.
This is the only time test.hackathonbbva.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BBVA (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 174.138.61.56 174.138.61.56 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
1 | 2606:4700::68... 2606:4700::6813:c797 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 104.108.61.228 104.108.61.228 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
3 | 2a03:2880:f02... 2a03:2880:f02d:12:face:b00c:0:3 | 32934 (FACEBOOK) (FACEBOOK - Facebook) | |
2 | 2606:2800:234... 2606:2800:234:46c:e8b:1e2f:2bd:694 | 15133 (EDGECAST) (EDGECAST - MCI Communications Services) | |
13 | 5 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
test.hackathonbbva.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-108-61-228.deploy.static.akamaitechnologies.com
www.bbva.mx |
ASN32934 (FACEBOOK - Facebook, Inc., US)
connect.facebook.net | |
staticxx.facebook.com |
ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US)
platform.twitter.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
hackathonbbva.com
test.hackathonbbva.com |
647 KB |
2 |
twitter.com
platform.twitter.com |
93 KB |
2 |
facebook.net
connect.facebook.net |
62 KB |
1 |
facebook.com
staticxx.facebook.com |
|
1 |
bbva.mx
www.bbva.mx |
1 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
13 | 6 |
Domain | Requested by | |
---|---|---|
6 | test.hackathonbbva.com |
test.hackathonbbva.com
|
2 | platform.twitter.com |
test.hackathonbbva.com
platform.twitter.com |
2 | connect.facebook.net |
test.hackathonbbva.com
connect.facebook.net |
1 | staticxx.facebook.com |
connect.facebook.net
|
1 | www.bbva.mx |
test.hackathonbbva.com
|
1 | cdnjs.cloudflare.com |
test.hackathonbbva.com
|
13 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
test.hackathonbbva.com Let's Encrypt Authority X3 |
2019-06-29 - 2019-09-27 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-02 - 2019-09-08 |
6 months | crt.sh |
bbva.mx DigiCert SHA2 Secure Server CA |
2019-06-11 - 2020-06-10 |
a year | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2019-06-06 - 2019-09-04 |
3 months | crt.sh |
*.twimg.com DigiCert SHA2 High Assurance Server CA |
2018-11-19 - 2019-11-27 |
a year | crt.sh |
This page contains 3 frames:
Primary Page:
https://test.hackathonbbva.com/
Frame ID: 97B6BD15B9E03C0653C346FF0506D6D9
Requests: 11 HTTP requests in this frame
Frame:
https://platform.twitter.com/widgets/widget_iframe.0639d67d95b7680840758b6833f06d87.html?origin=https%3A%2F%2Ftest.hackathonbbva.com
Frame ID: EB91813F75BE85FF45FF316357F4E9D2
Requests: 1 HTTP requests in this frame
Frame:
https://staticxx.facebook.com/connect/xd_arbiter.php?version=44
Frame ID: 4B28661AF255D87F78E0834519D7E47E
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
Python (Programming Languages) ExpandDetected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Django (Web Frameworks) Expand
Detected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
test.hackathonbbva.com/ |
19 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
material-design-iconic-font.min.css
cdnjs.cloudflare.com/ajax/libs/material-design-iconic-font/2.2.0/css/ |
69 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
staticbundle-ade7fa7950aacc59ad37.css
test.hackathonbbva.com/static/bundles/ |
1 MB 544 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_bbva_blanco.svg
www.bbva.mx/content/dam/public-web/global/images/logos/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
staticbundle-ade7fa7950aacc59ad37.js
test.hackathonbbva.com/static/bundles/ |
137 KB 46 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sdk.js
connect.facebook.net/es_ES/ |
3 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
widgets.js
platform.twitter.com/ |
93 KB 93 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d0ad97979779343e3c9c691b257b27c7.woff
test.hackathonbbva.com/static/bundles/ |
18 KB 18 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3f89dd0a44013966d75693e557cf9aaa.woff
test.hackathonbbva.com/static/bundles/ |
17 KB 17 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f6c0ce7dced2eea5a22ffeb94236ef72.woff
test.hackathonbbva.com/static/bundles/ |
18 KB 18 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sdk.js
connect.facebook.net/es_ES/ |
199 KB 59 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
widget_iframe.0639d67d95b7680840758b6833f06d87.html
platform.twitter.com/widgets/ Frame EB91 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xd_arbiter.php
staticxx.facebook.com/connect/ Frame 4B28 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BBVA (Financial)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| hide function| show function| show_right_field object| FB object| __twttrll object| twttr object| __twttr function| setImmediate function| clearImmediate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=True; includeSubDomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
connect.facebook.net
platform.twitter.com
staticxx.facebook.com
test.hackathonbbva.com
www.bbva.mx
104.108.61.228
174.138.61.56
2606:2800:234:46c:e8b:1e2f:2bd:694
2606:4700::6813:c797
2a03:2880:f02d:12:face:b00c:0:3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