atendimentox.com
Open in
urlscan Pro
2606:4700:30::681f:47e7
Malicious Activity!
Public Scan
Submission: On September 02 via automatic, source phishtank
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on August 30th 2019. Valid for: a year.
This is the only time atendimentox.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Bradesco (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 2606:4700:30:... 2606:4700:30::681f:47e7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
atendimentox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
atendimentox.com
atendimentox.com |
85 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | atendimentox.com |
atendimentox.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-08-30 - 2020-08-29 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://atendimentox.com/financedesbloxx/
Frame ID: 2D430D1A94B3DDD44811BB612D7D58D3
Requests: 11 HTTP requests in this frame
Frame:
https://atendimentox.com/financedesbloxx/iframes/index.php
Frame ID: C151B3093E1B3B5E2A423BF8AE9D8A89
Requests: 4 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- html /<div[^>]+class="[^"]*glyphicon glyphicon-/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
atendimentox.com/financedesbloxx/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
atendimentox.com/financedesbloxx/css/ |
118 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-theme.min.css
atendimentox.com/financedesbloxx/css/ |
23 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
atendimentox.com/financedesbloxx/scripts/ |
36 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
valida_conta.js
atendimentox.com/financedesbloxx/scripts/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
atendimentox.com/financedesbloxx/jquery/ |
77 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
html5placeholder.jquery.js
atendimentox.com/financedesbloxx/jquery/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
numeros.js
atendimentox.com/financedesbloxx/scripts/ |
200 B 173 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.php
atendimentox.com/financedesbloxx/iframes/ Frame C151 |
1 KB 595 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8951.jpg
atendimentox.com/financedesbloxx/images/ |
403 B 485 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4568.jpg
atendimentox.com/financedesbloxx/images/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyphicons-halflings-regular.woff2
atendimentox.com/financedesbloxx/fonts/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
atendimentox.com/financedesbloxx/bootstrap/css/ Frame C151 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-theme.min.css
atendimentox.com/financedesbloxx/bootstrap/css/ Frame C151 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
atendimentox.com/financedesbloxx/bootstrap/js/ Frame C151 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Bradesco (Banking)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Apenas_Numeros function| VerificaLogin function| ValidaLogin function| ValidaDigito function| Verificar function| checa_agencia function| seguranca_b function| ProcuraObjeto function| controle function| lyrVisual function| mOut function| onMouseOut undefined| tempo number| ns number| ie string| oldId function| $ function| jQuery function| number function| ssa function| clicks1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.atendimentox.com/ | Name: __cfduid Value: df5ec2a8735307417c71afffd7980cb9e1567413350 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
atendimentox.com
2606:4700:30::681f:47e7
1c7b084f91de115eee04ad34232b5ac09fae7a66a33d5761f9d0879e4dba43ee
245efbc2a66e9d61420ceb35afc920dc8a791909f37f750dc4e20cdb68389486
36460e494e4c628443afded40b2743b5ede9a4a76fb4f7b9ef2345cc7e59fd64
48d685402b465594e6ec567be7f1cddcedadc9b6721f5eed1ffe7555c15ef0dc
653e073e97423adda5bc3917a241ee8497dd38a48f14bcde0098a4e54fd0fa5e
6e2f830b3f67f08849e8282448c06c7a68aaa8f9b1a21b425e1975c2fc0bbba2
6ef73f2bcba3d27e6403d7ee8044e53e432641914428fb9ecc28dba3538c2a23
c73a339b42752222a5616cc8eac662628a33f49f8f76556710019fb74dbb99b9
c8d90299d868f5bceff7337be5eccdd053c2e83eb09472e4d62a047925fd55c0
cc788d3fcbf31d5ccf53d50b147658f6e7b16b67c4d69490b745c0e31913e375
de300f7f10932aef1a267d625bf5063fbdf9d4a290320aca68217bdf24e7ba97
fe185d11a49676890d47bb783312a0cda5a44c4039214094e7957b4c040ef11c