7pf0.top
Open in
urlscan Pro
103.142.87.156
Malicious Activity!
Public Scan
Submission: On July 09 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on July 8th 2023. Valid for: 3 months.
This is the only time 7pf0.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Commonwealth Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 103.142.87.156 103.142.87.156 | 138152 (YISUCLOUD...) (YISUCLOUDLTD-HK YISU CLOUD LTD) | |
9 | 2 |
Domain | Requested by | |
---|---|---|
9 | 7pf0.top |
7pf0.top
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ix7m.top R3 |
2023-07-08 - 2023-10-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://7pf0.top/commbiz1
Frame ID: F4E6C71CE8A57636562CF887933219E4
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Log on to NetBankDetected technologies
Laravel (Web Frameworks) ExpandDetected patterns
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
commbiz1
7pf0.top/ |
33 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
7pf0.top/novue/js/ |
86 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.all.js
7pf0.top/novue/js/layuiadmin/layui/ |
272 KB 101 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.css
7pf0.top/novue/js/layuiadmin/layui/css/ |
73 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
85.67c7c74f.css
7pf0.top/css/commbiz/ |
3 KB 841 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NB-Login-SmartMini.2fe75ea7.jpg
7pf0.top/img/commbiz/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
7pf0.top/novue/js/layuiadmin/layui/css/modules/laydate/default/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
7pf0.top/novue/js/layuiadmin/layui/css/modules/layer/default/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
7pf0.top/novue/js/layuiadmin/layui/css/modules/ |
1 KB 684 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Commonwealth Bank (Banking)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| $ function| jQuery object| layui number| errors function| lay object| layer object| id function| next1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
7pf0.top/ | Name: laravel_session Value: eyJpdiI6IlRzNVNEczRqTTlyUlltUjcvZTJhYWc9PSIsInZhbHVlIjoiMndRZUU1MnFkdG9WWVNwcDliM3Q3NTlvRG50SHI2dTJ1ZFFoNGF6UHIwdUo1dHkwOFZHb2dsMkVndDVYVkllUlo0ZkdIUk1HYTlaMURPVWtOdkFZL2xkaGhHdklwWHBUT0dMaUxDSllEd2wyOUtSZVpBSFRnUE03cWNwMGE4MDMiLCJtYWMiOiIwODg2MWY1OWI2YWQ5NWY1YjkzN2M3ZDI2N2U4NmFhOWEyZDczZmYzYzNjNzkxYzQyNTE4YmI1N2MzOWJkZTBlIiwidGFnIjoiIn0%3D |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
7pf0.top
103.142.87.156
0030c2dc74a6d515b7978b8a4de0d492c36af04f858f2002cced2a3142376093
07da4bfbc7602fbc1d9b6dbf92b03a6acd29972f9dbfa168a9c8016f0234d605
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
232b4a3a17d7d3c31e1527a611ae1a0238c4d6774825fe6ad30d5b00e254fa56
251a9e596ef2859fb0e92e13b4c619e95a131a93b55e48974552d312c75d9514
26437b94d0f04ca9799425e7db20bb14e17cc9f777fa64b92ad05f87e2fddc21
3eebb6c8549fbebd0a791552f11529a5a3348450978e7a806968f665efa61e43
4620bea7b8db9ffe1747e9c29910d7ea2ec84a7a3c7416e7a8a70e450073d820
4f6db60c1834eb977f3b6f3ea1b3c7bc6c128040920ed3df8bdb1b2dd976cd81
67e430e31687bbb734a9b4f5f6e6c3c9cfcc51c49ccff5530e508d174c78fbfd
68517f60f810bf6c8a590c0c9bd685fe213605cc925990d7e9bbc88ea180e870
cd4c4518e0684d548e90cf3ee37f04b9ab0b08d04569a8dfd8d97ff1e257d9e8