funipel.com.br
Open in
urlscan Pro
187.63.175.14
Malicious Activity!
Public Scan
Submission: On June 21 via automatic, source openphish
Summary
This is the only time funipel.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: USAA (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 187.63.175.14 187.63.175.14 | 28169 (BITCOM PR...) (BITCOM PROVEDOR DE SERVICOS DE INTERNET LTDA) | |
6 | 1 |
ASN28169 (BITCOM PROVEDOR DE SERVICOS DE INTERNET LTDA, BR)
PTR: kadosh.visao.psi.br
funipel.com.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
funipel.com.br
funipel.com.br |
114 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | funipel.com.br |
funipel.com.br
|
6 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://funipel.com.br/css/usi/step2.html
Frame ID: 6365.1
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
step2.html
funipel.com.br/css/usi/ |
14 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header1.png
funipel.com.br/css/usi/images/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
question.png
funipel.com.br/css/usi/images/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shape1299379984.png
funipel.com.br/css/usi/images/ |
538 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hheader.png
funipel.com.br/css/usi/images/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
next.png
funipel.com.br/css/usi/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: USAA (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
funipel.com.br
187.63.175.14
5f2bab9213710f1e859b67bc7c4afe3814deb58ddb493b058d6882d2cda16998
9ab40b33f5338ef8bc90918e769ac2369ebaf751ffa47f3f492cf56e7890bfdd
b228f2642cc5fd0043de05af1972ee540d7a4aacb5f5a9202f16491cdc55da48
b7ea28de0ca6b6063b94028f59d6dba5b3fab750649bb0430c03b818a9294653
d317311d433f87f896f1aaf61ac6fa2bf50ef575f775042f6ccaec461ed396ab
d57ecdb1b1b63078608ce4aadcdb8c8f4e1a3a05e9bce86feff28ce2cae4196c