www.trattoriabellavista.it
Open in
urlscan Pro
62.149.140.136
Malicious Activity!
Public Scan
Submission: On May 23 via manual from GB — Scanned from IT
Summary
TLS certificate: Issued by Actalis Domain Validation Server CA G3 on February 24th 2022. Valid for: a year.
This is the only time www.trattoriabellavista.it was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Alpha Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 62.149.140.136 62.149.140.136 | 31034 (ARUBA-ASN) (ARUBA-ASN) | |
1 | 2 |
ASN31034 (ARUBA-ASN, IT)
PTR: webx126.aruba.it
www.trattoriabellavista.it |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
trattoriabellavista.it
www.trattoriabellavista.it |
2 MB |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | www.trattoriabellavista.it | |
1 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
easy-space-renewai.coachsludiques.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.trattoriabellavista.it Actalis Domain Validation Server CA G3 |
2022-02-24 - 2023-03-27 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.trattoriabellavista.it/54565KJKJKJ/index.php/
Frame ID: BA2183E42DA7717F7654AA0FBBE8D880
Requests: 12 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: εδώ
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.trattoriabellavista.it/54565KJKJKJ/index.php/ |
2 MB 2 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
442 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
311 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
350 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
622 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
675 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
162 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1006 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 8 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Alpha Bank (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.trattoriabellavista.it
62.149.140.136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