www.lnternetbanklngcalxa.cf
Open in
urlscan Pro
2606:4700:30::681f:4cd2
Malicious Activity!
Public Scan
Submission: On June 06 via automatic, source phishtank
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on June 3rd 2019. Valid for: a year.
This is the only time www.lnternetbanklngcalxa.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Caixa (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2606:4700:30:... 2606:4700:30::681f:4cd2 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1450:401... 2a00:1450:4013:c07::5f | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2606:4700::68... 2606:4700::6813:c497 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1450:400... 2a00:1450:4001:824::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
15 | 6 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.lnternetbanklngcalxa.cf |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
lnternetbanklngcalxa.cf
www.lnternetbanklngcalxa.cf |
66 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
33 KB |
1 |
gstatic.com
fonts.gstatic.com |
9 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
1 |
googleapis.com
fonts.googleapis.com |
599 B |
15 | 6 |
Domain | Requested by | |
---|---|---|
9 | www.lnternetbanklngcalxa.cf |
www.lnternetbanklngcalxa.cf
|
2 | maxcdn.bootstrapcdn.com |
www.lnternetbanklngcalxa.cf
|
1 | fonts.gstatic.com | |
1 | cdnjs.cloudflare.com |
www.lnternetbanklngcalxa.cf
|
1 | code.jquery.com |
www.lnternetbanklngcalxa.cf
|
1 | fonts.googleapis.com |
www.lnternetbanklngcalxa.cf
|
15 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-06-03 - 2020-06-02 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-05-21 - 2019-08-13 |
3 months | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-02 - 2019-09-08 |
6 months | crt.sh |
*.google.com Google Internet Authority G3 |
2019-05-21 - 2019-08-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/ass_app_client.php?15598238394098541559823839.409854162.158.63.230
Frame ID: 7D0143EFFA9D6C7F0302912B32C5BF56
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui.*\.js/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
ass_app_client.php
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/_app_css/ |
3 KB 1007 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 599 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_app.png
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/_app_image/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.gif
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/_app_image/ |
35 KB 35 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Screenshot_1.png
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/_app_image/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 13 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.2.6.min.js
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/js/ |
54 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui-personalized-1.5.2.min.js
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/js/ |
21 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-fieldselection.js
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/js/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vkeyboard.js
www.lnternetbanklngcalxa.cf/Portal-Seguro/Calxa_Economlca_Federal/js/ |
2 KB 659 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v16/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Caixa (Government)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| Popper object| bootstrap function| somenteNumeros function| limitarInput2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.lnternetbanklngcalxa.cf/ | Name: PHPSESSID Value: uicl62h9gjig22dpf1h2safpv0 |
|
.lnternetbanklngcalxa.cf/ | Name: __cfduid Value: deef15d956cb5555738677e43b9e165501559852647 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
www.lnternetbanklngcalxa.cf
205.185.208.52
209.197.3.15
2606:4700:30::681f:4cd2
2606:4700::6813:c497
2a00:1450:4001:824::2003
2a00:1450:4013:c07::5f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