quirurgicamente.com
Open in
urlscan Pro
207.38.89.45
Malicious Activity!
Public Scan
Effective URL: https://quirurgicamente.com/login/ch-en/signin/signin.php?cmd=_update-information&account_update=ad041cdf68d6fd5ba7d96c553bd...
Submission: On January 30 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on December 19th 2020. Valid for: 3 months.
This is the only time quirurgicamente.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 10 | 207.38.89.45 207.38.89.45 | 30083 (AS-30083-...) (AS-30083-GO-DADDY-COM-LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:86c0:209... 2a00:86c0:2091::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
9 | 3 |
ASN30083 (AS-30083-GO-DADDY-COM-LLC, US)
PTR: sputnik1.swebserver.com
quirurgicamente.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
quirurgicamente.com
4 redirects
quirurgicamente.com |
281 KB |
2 |
nflxext.com
assets.nflxext.com |
326 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
10 | quirurgicamente.com |
4 redirects
quirurgicamente.com
|
2 | assets.nflxext.com |
quirurgicamente.com
|
1 | ajax.googleapis.com |
quirurgicamente.com
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
quirurgicamente.com cPanel, Inc. Certification Authority |
2020-12-19 - 2021-03-19 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-01-05 - 2021-03-30 |
3 months | crt.sh |
*.1.nflxso.net DigiCert SHA2 Secure Server CA |
2021-01-22 - 2021-02-24 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://quirurgicamente.com/login/ch-en/signin/signin.php?cmd=_update-information&account_update=ad041cdf68d6fd5ba7d96c553bd36066&lim_session=a6ef0128d4a935438afcf7efcbf0d6006939026f
Frame ID: 91E6E3C3FA90F614E990C747CD8D2B95
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://quirurgicamente.com/
HTTP 302
https://quirurgicamente.com/login/ HTTP 302
https://quirurgicamente.com/login/ch-en HTTP 301
https://quirurgicamente.com/login/ch-en/ HTTP 302
https://quirurgicamente.com/login/ch-en/signin/signin.php?cmd=_update-information&account_update=ad041cd... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://quirurgicamente.com/
HTTP 302
https://quirurgicamente.com/login/ HTTP 302
https://quirurgicamente.com/login/ch-en HTTP 301
https://quirurgicamente.com/login/ch-en/ HTTP 302
https://quirurgicamente.com/login/ch-en/signin/signin.php?cmd=_update-information&account_update=ad041cdf68d6fd5ba7d96c553bd36066&lim_session=a6ef0128d4a935438afcf7efcbf0d6006939026f Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signin.php
quirurgicamente.com/login/ch-en/signin/ Redirect Chain
|
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
codex.login.css
quirurgicamente.com/login/ch-en/lib/css/ |
149 KB 149 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.css
quirurgicamente.com/login/ch-en/lib/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FB-f-Logo__blue_57.png
assets.nflxext.com/ffe/siteui/login/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.placeholder.label.js
quirurgicamente.com/login/ch-en/lib/js/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.bootstrap.js
quirurgicamente.com/login/ch-en/lib/js/ |
40 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DZ-en-20180813-popsignuptwoweeks-perspective_alpha_website_large.jpg
assets.nflxext.com/ffe/siteui/vlv3/bd27b60f-02db-41da-8f5c-1558b01b44d0/17a20159-6c8b-4e60-be30-becbc0268684/ |
324 KB 324 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-93.woff
quirurgicamente.com/login/ch-en/lib/css/ |
72 KB 72 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| Codex object| C object| global object| process0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
assets.nflxext.com
quirurgicamente.com
207.38.89.45
2a00:1450:4001:802::200a
2a00:86c0:2091::1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