holychildhisar.com
Open in
urlscan Pro
135.181.232.234
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On September 19 via api from NL — Scanned from FI
Summary
TLS certificate: Issued by R10 on September 1st 2024. Valid for: 3 months.
This is the only time holychildhisar.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la República Oriental del Uruguay (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 135.181.232.234 135.181.232.234 | 24940 (HETZNER-AS) (HETZNER-AS) | |
10 | 1 |
ASN24940 (HETZNER-AS, DE)
PTR: host.maktechnolabs.net
holychildhisar.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
holychildhisar.com
holychildhisar.com |
277 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | holychildhisar.com |
holychildhisar.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
holychildhisar.com R10 |
2024-09-01 - 2024-11-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://holychildhisar.com/Brou/
Frame ID: 8766FBDEC4CC04AFEA40432C434A259F
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
holychildhisar.com/Brou/ |
38 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lasfuentes.css
holychildhisar.com/Brou/cerezo/ |
200 B 211 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
losiconos.css
holychildhisar.com/Brou/cerezo/ |
59 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chuqui2.css
holychildhisar.com/Brou/cerezo/ |
39 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
holychildhisar.com/Brou/cerezo/ |
5 KB 524 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chuquiti.css
holychildhisar.com/Brou/cerezo/ |
640 KB 87 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
elfondito.jpg
holychildhisar.com/Brou/mex/ |
130 KB 130 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
laflecha.svg
holychildhisar.com/Brou/mex/ |
364 B 507 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
goterobook.woff2
holychildhisar.com/Brou/cerezo/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
goteromedio.woff2
holychildhisar.com/Brou/cerezo/ |
20 KB 20 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la República Oriental del Uruguay (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
holychildhisar.com
135.181.232.234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