ft9r3d-5000.csb.app Open in urlscan Pro
2606:4700::6812:7b8  Malicious Activity! Public Scan

URL: https://ft9r3d-5000.csb.app/
Submission: On August 02 via api from PL — Scanned from JP

Summary

This website contacted 5 IPs in 3 countries across 3 domains to perform 6 HTTP transactions. The main IP is 2606:4700::6812:7b8, located in United States and belongs to CLOUDFLARENET, US. The main domain is ft9r3d-5000.csb.app.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on December 30th 2023. Valid for: a year.
This is the only time ft9r3d-5000.csb.app was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Banco Galicia (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 161.190.1.97 13474 (Banco de ...)
1 104.18.29.19 13335 (CLOUDFLAR...)
2 104.18.6.184 13335 (CLOUDFLAR...)
1 104.18.28.19 13335 (CLOUDFLAR...)
6 5
Apex Domain
Subdomains
Transfer
3 csb.app
ft9r3d-5000.csb.app
534 KB
2 codesandbox.io
codesandbox.io — Cisco Umbrella Rank: 209528
56 KB
1 bancogalicia.com.ar
onlinebanking.bancogalicia.com.ar
2 KB
6 3
Domain Requested by
3 ft9r3d-5000.csb.app ft9r3d-5000.csb.app
2 codesandbox.io ft9r3d-5000.csb.app
codesandbox.io
1 onlinebanking.bancogalicia.com.ar ft9r3d-5000.csb.app
6 3

This site contains no links.

Subject Issuer Validity Valid
csb.app
Cloudflare Inc ECC CA-3
2023-12-30 -
2024-12-29
a year crt.sh
onlinebanking.bancogalicia.com.ar
DigiCert EV RSA CA G2
2023-09-19 -
2024-09-18
a year crt.sh
codesandbox.io
E6
2024-07-21 -
2024-10-19
3 months crt.sh

This page contains 2 frames:

Primary Page: https://ft9r3d-5000.csb.app/
Frame ID: C947EF25045D0D0ABFB3CBB2D8552867
Requests: 5 HTTP requests in this frame

Frame: https://codesandbox.io/p/devtool/inline-preview/ft9r3d-5000
Frame ID: 794C9D29E3A407C82B5FE308D7988A81
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Formulario de Login

Page Statistics

6
Requests

100 %
HTTPS

20 %
IPv6

3
Domains

3
Subdomains

5
IPs

3
Countries

592 kB
Transfer

720 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ft9r3d-5000.csb.app/
7 KB
3 KB
Document
General
Full URL
https://ft9r3d-5000.csb.app/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:7b8 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c8877645f636a48d37f4d4d5c3609eaae715090d772c0ab0a3070618f7c72988
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
8acf2c53ec46afff-NRT
content-disposition
inline; filename="index.html"
content-encoding
br
content-type
text/html; charset=utf-8
date
Fri, 02 Aug 2024 15:41:38 GMT
server
cloudflare
strict-transport-security
max-age=31536000; includeSubDomains
vary
Accept-Encoding, Accept-Encoding
logo.svg
onlinebanking.bancogalicia.com.ar/images/default/
5 KB
2 KB
Image
General
Full URL
https://onlinebanking.bancogalicia.com.ar/images/default/logo.svg
Requested by
Host: ft9r3d-5000.csb.app
URL: https://ft9r3d-5000.csb.app/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
161.190.1.97 Buenos Aires, Argentina, ASN13474 (Banco de Galicia y Buenos Aires, AR),
Reverse DNS
inversiones.bancogalicia.com.ar
Software
/
Resource Hash
fad6369e7b4e8af718c87cf1d5e13e9f3c3e831725a388ad52a971ee70c1abe8

Request headers

Referer
https://ft9r3d-5000.csb.app/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

Date
Fri, 02 Aug 2024 15:41:10 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 May 2024 13:17:59 GMT
ETag
"801d32a0cab1da1:0"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Accept-Ranges
bytes
Content-Length
1806
preview-protocol.js
codesandbox.io/p/
176 KB
56 KB
Script
General
Full URL
https://codesandbox.io/p/preview-protocol.js
Requested by
Host: ft9r3d-5000.csb.app
URL: https://ft9r3d-5000.csb.app/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.29.19 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
e5816a040f78bd21a0a149637977c04c952c491111c5dcbec993fa91b4cb566c

Request headers

Referer
https://ft9r3d-5000.csb.app/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

date
Fri, 02 Aug 2024 15:41:39 GMT
via
1.1 google
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 25 Jul 2024 15:21:44 GMT
server
cloudflare
age
86404
x-powered-by
Express
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800, immutable
cf-ray
8acf2c5e9fdef5bb-NRT
alt-svc
h3=":443"; ma=86400
bg.png
ft9r3d-5000.csb.app/
530 KB
531 KB
Image
General
Full URL
https://ft9r3d-5000.csb.app/bg.png
Requested by
Host: ft9r3d-5000.csb.app
URL: https://ft9r3d-5000.csb.app/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.6.184 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
718ec31f3494fe5bab5de074f5d282f758a07c029d22982d42f5c5fcb06a47f1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://ft9r3d-5000.csb.app/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

date
Fri, 02 Aug 2024 15:41:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains
cf-cache-status
DYNAMIC
server
cloudflare
etag
"adbe85358537467d72ea810889a6f7ce52beff80"
vary
Accept-Encoding
content-type
image/png
content-disposition
inline; filename="bg.png"
accept-ranges
bytes
cf-ray
8acf2c5e8d98737c-NRT
alt-svc
h3=":443"; ma=86400
content-length
543123
ft9r3d-5000
codesandbox.io/p/devtool/inline-preview/ Frame 794C
0
0
Document
General
Full URL
https://codesandbox.io/p/devtool/inline-preview/ft9r3d-5000
Requested by
Host: codesandbox.io
URL: https://codesandbox.io/p/preview-protocol.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.28.19 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express
Resource Hash

Request headers

Referer
https://ft9r3d-5000.csb.app/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-cache, no-store, must-revalidate
cf-cache-status
DYNAMIC
cf-ray
8acf2c5f5fcc6874-NRT
content-encoding
br
content-type
text/html; charset=utf-8
date
Fri, 02 Aug 2024 15:41:39 GMT
frame-ancestors
'self' https://ft9r3d-5000.csb.app
server
cloudflare
via
1.1 google
x-powered-by
Express
favicon.ico
ft9r3d-5000.csb.app/
2 KB
854 B
Other
General
Full URL
https://ft9r3d-5000.csb.app/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.6.184 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8c45c679f40c3f81c111fbf2398d568189c3ab34d8a9704ad225cd8efe1b819f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://ft9r3d-5000.csb.app/
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Response headers

date
Fri, 02 Aug 2024 15:41:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains
content-encoding
br
cf-cache-status
DYNAMIC
server
cloudflare
vary
Accept-Encoding
content-type
text/html; charset=utf-8
cf-ray
8acf2c6bbe05737c-NRT
alt-svc
h3=":443"; ma=86400

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Banco Galicia (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| __REACT_DEVTOOLS_GLOBAL_HOOK__ object| CODESANDBOX_PREVIEW object| __CSB_PREVIEW_PROTOCOL function| enableLocalhostProxy

2 Cookies

Domain/Path Name / Value
.codesandbox.io/ Name: _cfuvid
Value: VRzQEuWQqivwhS_asnCFxySTV4idl8KOVP6BENrKao8-1722613299466-0.0.1.1-604800000
.codesandbox.io/ Name: cf_clearance
Value: KP74xNes9K8YHCDDrXjPJS9i1ss__Ay.QZpwab5iNcI-1722613301-1.0.1.1-OJAPM3GA_vkhkvEPOt5ORmOJSwhkEP4IQZMV4dlbxr77Sb_IiWNpxENsrPs3NSrpGmM2PjgjC4RpqPZ12kimqg

2 Console Messages

Source Level URL
Text
recommendation verbose URL: https://ft9r3d-5000.csb.app/
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
network error URL: https://ft9r3d-5000.csb.app/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains