www.agrestina.pe.gov.br Open in urlscan Pro
162.241.203.26  Malicious Activity! Public Scan

Submitted URL: https://www.moveisguifrio.com/denjaver
Effective URL: https://www.agrestina.pe.gov.br/sn/login.php
Submission: On June 22 via manual from NO — Scanned from NO

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 162.241.203.26, located in and belongs to . The main domain is www.agrestina.pe.gov.br.
TLS certificate: Issued by R3 on May 30th 2023. Valid for: 3 months.
This is the only time www.agrestina.pe.gov.br was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Nordea (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2 185.32.190.60 62416 (PTSERVIDOR)
1 159.65.4.160 14061 (DIGITALOC...)
1 3 162.241.203.26 ()
4 4
Apex Domain
Subdomains
Transfer
3 agrestina.pe.gov.br
www.agrestina.pe.gov.br
151 KB
2 moveisguifrio.com
www.moveisguifrio.com
267 B
1 rmp.gov.bd
rmp.gov.bd
283 B
4 3
Domain Requested by
3 www.agrestina.pe.gov.br 1 redirects rmp.gov.bd
www.agrestina.pe.gov.br
2 www.moveisguifrio.com 1 redirects
1 rmp.gov.bd
4 3

This site contains no links.

Subject Issuer Validity Valid
moveisguifrio.com
cPanel, Inc. Certification Authority
2023-04-26 -
2023-07-25
3 months crt.sh
rmp.gov.bd
cPanel, Inc. Certification Authority
2023-06-19 -
2023-09-17
3 months crt.sh
cpcontacts.agrestina.pe.gov.br
R3
2023-05-30 -
2023-08-28
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.agrestina.pe.gov.br/sn/login.php
Frame ID: 9870824F710FD62BDB4E2236E78F5E14
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.moveisguifrio.com/denjaver HTTP 301
    https://www.moveisguifrio.com/denjaver/ Page URL
  2. https://rmp.gov.bd/core/nrd/ Page URL
  3. https://www.agrestina.pe.gov.br/sn/ HTTP 302
    https://www.agrestina.pe.gov.br/sn/login.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

151 kB
Transfer

390 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.moveisguifrio.com/denjaver HTTP 301
    https://www.moveisguifrio.com/denjaver/ Page URL
  2. https://rmp.gov.bd/core/nrd/ Page URL
  3. https://www.agrestina.pe.gov.br/sn/ HTTP 302
    https://www.agrestina.pe.gov.br/sn/login.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://www.moveisguifrio.com/denjaver HTTP 301
  • https://www.moveisguifrio.com/denjaver/

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
www.moveisguifrio.com/denjaver/
Redirect Chain
  • https://www.moveisguifrio.com/denjaver
  • https://www.moveisguifrio.com/denjaver/
94 B
159 B
Document
General
Full URL
https://www.moveisguifrio.com/denjaver/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.32.190.60 , Portugal, ASN62416 (PTSERVIDOR, PT),
Reverse DNS
tera.unio.pt
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36
accept-language
no-NO,no;q=0.9

Response headers

accept-ranges
bytes
content-length
94
content-type
text/html
date
Thu, 22 Jun 2023 11:40:35 GMT
last-modified
Wed, 21 Jun 2023 19:31:32 GMT
server
Apache

Redirect headers

content-length
247
content-type
text/html; charset=iso-8859-1
date
Thu, 22 Jun 2023 11:40:35 GMT
location
https://www.moveisguifrio.com/denjaver/
server
Apache
/
rmp.gov.bd/core/nrd/
76 B
283 B
Document
General
Full URL
https://rmp.gov.bd/core/nrd/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
159.65.4.160 , Singapore, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
cp.desktopit.net
Software
Apache /
Resource Hash

Request headers

Referer
https://www.moveisguifrio.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36
accept-language
no-NO,no;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Thu, 22 Jun 2023 11:40:36 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked
Primary Request login.php
www.agrestina.pe.gov.br/sn/
Redirect Chain
  • https://www.agrestina.pe.gov.br/sn/
  • https://www.agrestina.pe.gov.br/sn/login.php
81 KB
50 KB
Document
General
Full URL
https://www.agrestina.pe.gov.br/sn/login.php
Requested by
Host: rmp.gov.bd
URL: https://rmp.gov.bd/core/nrd/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.203.26 -, , ASN (),
Reverse DNS
Software
Apache /
Resource Hash
0ca99d6989b08389db3bd7a8c8b51ebf49e26c59004dab52620ca25bb8df2b10

Request headers

Referer
https://rmp.gov.bd/core/nrd/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36
accept-language
no-NO,no;q=0.9

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Thu, 22 Jun 2023 11:40:40 GMT
server
Apache
vary
Accept-Encoding

Redirect headers

content-length
0
content-type
text/html; charset=UTF-8
date
Thu, 22 Jun 2023 11:40:40 GMT
location
login.php
server
Apache
jquery.js
www.agrestina.pe.gov.br/sn/partials/js/
266 KB
101 KB
Script
General
Full URL
https://www.agrestina.pe.gov.br/sn/partials/js/jquery.js
Requested by
Host: www.agrestina.pe.gov.br
URL: https://www.agrestina.pe.gov.br/sn/login.php
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.203.26 -, , ASN (),
Reverse DNS
Software
Apache /
Resource Hash
4ef5f864f89db7feaaaa5332c0a99d76076af49fef488806541ca2561e4cb379

Request headers

accept-language
no-NO,no;q=0.9
Referer
https://www.agrestina.pe.gov.br/sn/login.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

date
Thu, 22 Jun 2023 11:40:40 GMT
content-encoding
gzip
last-modified
Fri, 05 Feb 2021 15:11:28 GMT
server
Apache
accept-ranges
bytes
vary
Accept-Encoding
content-type
application/javascript
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
742f4ac7148ead577b274c9d2ee2d5b6a4916bcfcf483d7a0c1d75bae8fe1261

Request headers

accept-language
no-NO,no;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
39 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9fc5b5c44107cfc6701be07fa5d5a4d7ab066607dd7ab6e9f396ac709e28424f

Request headers

accept-language
no-NO,no;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Nordea (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend

0 Cookies