desbloquear.mbway.sbs
Open in
urlscan Pro
172.67.158.39
Malicious Activity!
Public Scan
Submission: On October 26 via manual from PT — Scanned from PT
Summary
TLS certificate: Issued by GTS CA 1P5 on October 26th 2023. Valid for: 3 months.
This is the only time desbloquear.mbway.sbs was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 172.67.158.39 172.67.158.39 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.16.123.175 104.16.123.175 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 151.101.194.137 151.101.194.137 | 54113 (FASTLY) (FASTLY) | |
16 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
mbway.sbs
desbloquear.mbway.sbs |
38 KB |
2 |
unpkg.com
unpkg.com — Cisco Umbrella Rank: 1425 |
6 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1243 |
30 KB |
16 | 3 |
Domain | Requested by | |
---|---|---|
13 | desbloquear.mbway.sbs |
desbloquear.mbway.sbs
|
2 | unpkg.com |
desbloquear.mbway.sbs
|
1 | code.jquery.com |
desbloquear.mbway.sbs
|
16 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mbway.sbs GTS CA 1P5 |
2023-10-26 - 2024-01-24 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-02 - 2024-05-01 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://desbloquear.mbway.sbs/
Frame ID: E846725A056A94D1C50968CCC21155E1
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
desbloquear.mbway.sbs/ |
1 KB 982 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
desbloquear.mbway.sbs/ |
2 KB 954 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aos.css
unpkg.com/aos@2.3.1/dist/ |
25 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
desbloquear.mbway.sbs/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SANTANDER.png
desbloquear.mbway.sbs/bancos/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BPI.png
desbloquear.mbway.sbs/bancos/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MILLENIUM.png
desbloquear.mbway.sbs/bancos/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MONTEPIO.png
desbloquear.mbway.sbs/bancos/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CREDITOAGRICOLA.png
desbloquear.mbway.sbs/bancos/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NOVOBANCO.png
desbloquear.mbway.sbs/bancos/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CAIXAGERAL.png
desbloquear.mbway.sbs/bancos/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ACTIVOBANK.png
desbloquear.mbway.sbs/bancos/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ABANCA.png
desbloquear.mbway.sbs/bancos/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.7.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aos.js
unpkg.com/aos@2.3.1/dist/ |
14 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
desbloquear.mbway.sbs/ |
120 B 434 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
October 26th 2023, 4:34:22 pm
UTC —
From Portugal
Threats:
Phishing
Brands:
BCP
PT
Banco BPI
PT
Novobanco
PT
Comment: Fake malicious site, with phishkit to collect credentials from costumers of Portuguese banks. Protected with Cloudflare.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery object| AOS function| carregar0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
desbloquear.mbway.sbs
unpkg.com
104.16.123.175
151.101.194.137
172.67.158.39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