www.micronec.net.br
Open in
urlscan Pro
108.167.188.187
Malicious Activity!
Public Scan
Submission: On May 20 via automatic, source phishtank
Summary
This is the only time www.micronec.net.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 108.167.188.187 108.167.188.187 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
10 | 1 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: srv140-ip03.prodns.com.br
www.micronec.net.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
micronec.net.br
www.micronec.net.br |
61 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.micronec.net.br |
www.micronec.net.br
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.micronec.net.br/images/recadastramento/mobile/index2.php
Frame ID: B7BB3391DC2C7FA354024F27A3508AC0
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Twitter Bootstrap () Expand
Detected patterns
- html /<div[^>]+class="[^"]*glyphicon glyphicon-/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index2.php
www.micronec.net.br/images/recadastramento/mobile/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
html5shiv.js
www.micronec.net.br/images/recadastramento/mobile/scripts/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
validation.js
www.micronec.net.br/images/recadastramento/mobile/scripts/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.micronec.net.br/images/recadastramento/mobile/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a009.jpg
www.micronec.net.br/images/recadastramento/mobile/images/ |
13 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a008.jpg
www.micronec.net.br/images/recadastramento/mobile/images/ |
13 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a005.jpg
www.micronec.net.br/images/recadastramento/mobile/images/ |
291 B 508 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a007.jpg
www.micronec.net.br/images/recadastramento/mobile/images/ |
1002 B 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-loading.png
www.micronec.net.br/images/recadastramento/mobile/images/ |
936 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendana.ttf
www.micronec.net.br/images/recadastramento/mobile/font/ |
24 KB 24 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| html5 function| SomenteNumero function| maskTrak function| mascaraTelefone function| pulacampo function| validation2 function| feixaMG0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.micronec.net.br
108.167.188.187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