pmessaros.com
Open in
urlscan Pro
191.252.119.2
Malicious Activity!
Public Scan
Effective URL: https://pmessaros.com/
Submission: On January 16 via manual from ES — Scanned from ES
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on January 10th 2023. Valid for: 3 months.
This is the only time pmessaros.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BBVA (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 3 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
12 | 191.252.119.2 191.252.119.2 | 27715 (Locaweb S...) (Locaweb Servicos de Internet SA) | |
17 | 2 |
ASN27715 (Locaweb Servicos de Internet SA, BR)
PTR: gagarin2053.hospedagemdesites.ws
pmessaros.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
pmessaros.com
pmessaros.com |
1 MB |
3 |
ggle.io
3 redirects
www.ggle.io ggle.io |
1 KB |
0 |
bbva.es
Failed
movil.bbva.es Failed |
|
17 | 3 |
Domain | Requested by | |
---|---|---|
12 | pmessaros.com |
pmessaros.com
|
2 | www.ggle.io | 2 redirects |
1 | ggle.io | 1 redirects |
0 | movil.bbva.es Failed |
pmessaros.com
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pmessaros.com cPanel, Inc. Certification Authority |
2023-01-10 - 2023-04-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pmessaros.com/
Frame ID: FFD94BE4D1F231B76CF014CCB09A03B3
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
BBVAPage URL History Show full URLs
-
http://www.ggle.io/BbvaClientes2023
HTTP 301
https://www.ggle.io/BbvaClientes2023 HTTP 301
https://ggle.io/BbvaClientes2023 HTTP 302
https://pmessaros.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.ggle.io/BbvaClientes2023
HTTP 301
https://www.ggle.io/BbvaClientes2023 HTTP 301
https://ggle.io/BbvaClientes2023 HTTP 302
https://pmessaros.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
pmessaros.com/ Redirect Chain
|
25 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor-d24499a07e3ae984eca949fda39072dc.css
pmessaros.com/BBVA_files/ |
526 B 767 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buzz-621864c6da854cf15f4b9690d95170e7.css
pmessaros.com/BBVA_files/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
BentonSansBBVA-Book-dad6b6198b8254b8bce259aefda62568.woff
movil.bbva.es/apps/woody/assets/vendor/res/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
BentonSansBBVA-Medium-f50002bc63bc7f6f4e68c65bd0ec40d4.woff
movil.bbva.es/apps/woody/assets/vendor/res/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
BentonSansBBVA-BookItalic-c109f702b5103d7302b44179636a6b6b.woff
movil.bbva.es/apps/woody/assets/vendor/res/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
BentonSansBBVA-MediumItalic-803e1fe842adc8c2e1aa001b53874f0b.woff
movil.bbva.es/apps/woody/assets/vendor/res/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
icon-maiden-78ff189089da6b38cd21da4f40801d71.woff
movil.bbva.es/apps/woody/assets/vendor/res/iconfonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-latest.min.js
pmessaros.com/ |
84 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.min-9773ce9acc665f27e667abde8d13af07.css
pmessaros.com/BBVA_files/ |
789 KB 790 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-white-1c1c2a68cc4c755b9ebacef725dd3421.svg
pmessaros.com/BBVA_files/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-menu-a5a292edf3027c756482651a9fbb4bd3.svg
pmessaros.com/BBVA_files/res/img/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
video.gif
pmessaros.com/ |
1 MB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BentonSansBBVA-Book-dad6b6198b8254b8bce259aefda62568.woff
pmessaros.com/BBVA_files/res/fonts/ |
69 KB 69 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-maiden-78ff189089da6b38cd21da4f40801d71.woff
pmessaros.com/BBVA_files/res/iconfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BentonSansBBVA-Medium-f50002bc63bc7f6f4e68c65bd0ec40d4.woff
pmessaros.com/BBVA_files/res/fonts/ |
71 KB 71 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-maiden.ttf
pmessaros.com/BBVA_files/res/iconfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- movil.bbva.es
- URL
- https://movil.bbva.es/apps/woody/assets/vendor/res/fonts/BentonSansBBVA-Book-dad6b6198b8254b8bce259aefda62568.woff
- Domain
- movil.bbva.es
- URL
- https://movil.bbva.es/apps/woody/assets/vendor/res/fonts/BentonSansBBVA-Medium-f50002bc63bc7f6f4e68c65bd0ec40d4.woff
- Domain
- movil.bbva.es
- URL
- https://movil.bbva.es/apps/woody/assets/vendor/res/fonts/BentonSansBBVA-BookItalic-c109f702b5103d7302b44179636a6b6b.woff
- Domain
- movil.bbva.es
- URL
- https://movil.bbva.es/apps/woody/assets/vendor/res/fonts/BentonSansBBVA-MediumItalic-803e1fe842adc8c2e1aa001b53874f0b.woff
- Domain
- movil.bbva.es
- URL
- https://movil.bbva.es/apps/woody/assets/vendor/res/iconfonts/icon-maiden-78ff189089da6b38cd21da4f40801d71.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BBVA (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
pmessaros.com/ | Name: COOKIE_KEY Value: 167389101982 |
13 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ggle.io
movil.bbva.es
pmessaros.com
www.ggle.io
movil.bbva.es
191.252.119.2
199.36.158.100
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
32b5be70164acc09cb52ed04d8e5b86b3461bb03037ce96176e5cd1030e6bee9
683f5dea1976fd4a6745667691c91dcffb2db35cf292aa17a3ed079e12f8ba7a
7af3360fe39c201b1ccbe7a726a5d3c2f0253add6616b71176f0d9e7c849a732
8b297f560fc70647c42967ad632d10fb48467741c442b2a3dc356ee1be9c9a30
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
e4363a4b0b02c1c107b9d4d0f11a1179920fafa4414e9519ad00aaf7eaa63c72
ef45e40b0ae5cbb2bacbf452e0c016b64e5c7b64d75e1f6477a98bf8fa5ff61b
faef4c0bda0c3c95f57f42c990d7623eedb0d7f8174a6640ff4114f1091217ec
fe73f5972955b5c4e807d226ec4294ea066345bb6b05e8ae347bddef82a5fb86