infernoposty.com
Open in
urlscan Pro
66.235.200.147
Malicious Activity!
Public Scan
Submission: On March 21 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 11th 2023. Valid for: a year.
This is the only time infernoposty.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Correos (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 66.235.200.147 66.235.200.147 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a02:ec80:300... 2a02:ec80:300:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
14 | 2 |
ASN13335 (CLOUDFLARENET, US)
PTR: host77.ipowerweb.com
infernoposty.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
infernoposty.com
infernoposty.com |
288 KB |
1 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 3604 |
96 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
13 | infernoposty.com |
infernoposty.com
|
1 | upload.wikimedia.org |
infernoposty.com
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
infernoposty.com Cloudflare Inc ECC CA-3 |
2023-06-11 - 2024-06-09 |
a year | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2023-10-18 - 2024-10-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://infernoposty.com/AK/CorreoARG/
Frame ID: 795CC6CA15AAB50B44B8A6B6D6A4078A
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
infernoposty.com/AK/CorreoARG/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
head.css
infernoposty.com/AK/CorreoARG/styles/ |
882 B 507 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
infernoposty.com/AK/CorreoARG/styles/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
corr.css
infernoposty.com/AK/CorreoARG/styles/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
responsive.css
infernoposty.com/AK/CorreoARG/styles/ |
2 KB 542 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2560px-Correo_Argentino_Logo.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/a/ad/Correo_Argentino_Logo.svg/ |
96 KB 96 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background-login.jpg
infernoposty.com/AK/CorreoARG/images/ |
129 KB 130 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pac.png
infernoposty.com/AK/CorreoARG/images/ |
96 KB 96 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
apple_store.webp
infernoposty.com/AK/CorreoARG/images/ |
9 KB 9 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google-pay.webp
infernoposty.com/AK/CorreoARG/images/ |
9 KB 9 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
galery.svg
infernoposty.com/AK/CorreoARG/images/ |
25 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
infernoposty.com/AK/CorreoARG/javascript/ |
8 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CarteroRegular.otf
infernoposty.com/AK/CorreoARG/fonts/ |
37 KB 14 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CarteroLight.otf
infernoposty.com/AK/CorreoARG/fonts/ |
37 KB 14 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Correos (Transportation)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| setCookie function| deleteCookie function| getCookie1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.infernoposty.com/ | Name: _cfuvid Value: E1z7Ib96GWbmZL0CFbpbbVdMTTbYuVz32zCF5bfpYIk-1711057902264-0.0.1.1-604800000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
infernoposty.com
upload.wikimedia.org
2a02:ec80:300:ed1a::2:b
66.235.200.147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