pammaloida.com
Open in
urlscan Pro
13.237.191.82
Malicious Activity!
Public Scan
Submission: On October 14 via automatic, source openphish
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 8th 2020. Valid for: 3 months.
This is the only time pammaloida.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Banking (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 13.237.191.82 13.237.191.82 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 4 |
ASN16509 (AMAZON-02, US)
PTR: webhost.grownzbusiness.co.nz
pammaloida.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
pammaloida.com
pammaloida.com |
25 KB |
1 |
gstatic.com
fonts.gstatic.com |
42 KB |
1 |
googleapis.com
fonts.googleapis.com |
1 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
9 | 4 |
Domain | Requested by | |
---|---|---|
6 | pammaloida.com |
pammaloida.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
pammaloida.com
|
1 | code.jquery.com |
pammaloida.com
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pammaloida.com Let's Encrypt Authority X3 |
2020-10-08 - 2021-01-06 |
3 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-09-22 - 2020-12-15 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-09-22 - 2020-12-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/2.php
Frame ID: BE204AC546E1CD82A910201C5D5EC342
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
2.php
pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/ |
1 KB 777 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
transition.css
pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/css/ |
67 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
code.jquery.com/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.min.js
pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/scripts/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/scripts/ |
596 B 590 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
pammaloida.com/wp-content/plugins/fighter/sMT18rdrwRbuRmdOqO0KRLcIb5SaQlf9z01xhUfTm7F5jjJPyA/Appc64c600/images/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1Ptug8zYS_SKggPNyC0IT4ttDfA.woff2
fonts.gstatic.com/s/raleway/v18/ |
41 KB 42 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Banking (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery object| $jscomp function| redirect0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
pammaloida.com
13.237.191.82
2001:4de0:ac19::1:b:1b
2a00:1450:4001:801::200a
2a00:1450:4001:819::2003
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
259d31fa6157f76fc736c151e3b2643b363a602062e7553dc1c7a0e8de7db26c
6708121427fdcfa444fc3948886e48081114ea9fb6334d914c9a0d1a7d18c793
72237585c2af0900193e582ebe7a1b93604d000c9fee837f1f7ea9189770e6e9
a8aa5cde45794a32137f15fa65aa5c10f5b5cde25c7212659aa9df5a983be335
bb0c201f0ca67e745869967d48db2e90bf01353d1f305959d487291cab6d0755
bbb318e841b96acb3c2614eec417a4d7caf9606ea996507dccba84e2f6724e7e
cb0e4ad905471df0782b221b8b1b892c3a04be0ac414223a80288be22f44f158
f83771c3404102261eafda39b0cf052ef861862f33d7f2264346c6226f00c44b