kievconstructora.com.ar
Open in
urlscan Pro
162.252.82.187
Malicious Activity!
Public Scan
Effective URL: https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user/
Submission: On May 24 via manual from HU — Scanned from IT
Summary
TLS certificate: Issued by R3 on March 30th 2024. Valid for: 3 months.
This is the only time kievconstructora.com.ar was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MVM Next (Utility)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 162.252.82.187 162.252.82.187 | 29802 (HVC-AS) (HVC-AS) | |
5 | 79.171.139.32 79.171.139.32 | 43928 (MVMI-AS M...) (MVMI-AS MVMI service network) | |
10 | 3 |
ASN29802 (HVC-AS, US)
PTR: cpanel124.wnpservers.net
kievconstructora.com.ar |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
mvmnext.hu
belepes.mvmnext.hu |
18 KB |
3 |
kievconstructora.com.ar
1 redirects
kievconstructora.com.ar |
3 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
5 | belepes.mvmnext.hu |
kievconstructora.com.ar
belepes.mvmnext.hu |
3 | kievconstructora.com.ar |
1 redirects
kievconstructora.com.ar
|
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
mvmfiok.mvmnext.hu |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.kievconstructora.com.ar R3 |
2024-03-30 - 2024-06-28 |
3 months | crt.sh |
*.mvmnext.hu e-Szigno Class3 SSL CA 2017 |
2024-01-17 - 2025-02-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user/
Frame ID: 6A0BD7E69CACB6D7F0C39C74C9B0D11B
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Belépés ide: MVM-fiókPage URL History Show full URLs
- https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/ Page URL
-
https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user
HTTP 301
https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Részletes információ a sütikről
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/ Page URL
-
https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user
HTTP 301
https://kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/ |
159 B 285 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
kievconstructora.com.ar/wp-includes/css/washt/qSsxUNuOggLoDItsrTYf/user/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.min.css
belepes.mvmnext.hu//resources/l6y1w/login/mvm/dist/css/ |
49 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
forgot-password.svg
belepes.mvmnext.hu/resources/l6y1w/login/mvm/img/icon/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_white.svg
belepes.mvmnext.hu//resources/l6y1w/login/mvm/img/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Panton-ExtraBold.woff2
belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keys.svg
belepes.mvmnext.hu//resources/l6y1w/login/mvm/img/icon/ |
5 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Panton-ExtraBold.woff
belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Panton-ExtraBold.ttf
belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon-32x32.png
belepes.mvmnext.hu//resources/l6y1w/login/mvm/favicon/ |
2 KB 3 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- belepes.mvmnext.hu
- URL
- https://belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/Panton-ExtraBold.woff2
- Domain
- belepes.mvmnext.hu
- URL
- https://belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/Panton-ExtraBold.woff
- Domain
- belepes.mvmnext.hu
- URL
- https://belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/Panton-ExtraBold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MVM Next (Utility)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
kievconstructora.com.ar/ | Name: PHPSESSID Value: 18eb60525d1aef0ceef0859166be9fbf |
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
belepes.mvmnext.hu
kievconstructora.com.ar
belepes.mvmnext.hu
162.252.82.187
79.171.139.32
428950679584381a8911ed1c184d678ce845eaded6e632893a4c1a7dba493890
6467d78bcc18f73b549223f4b140ca5e36b3e2db8b2e6345b8c075431d20e2a9
8b82f543a3bdafa0cee9fc1402302d7a2db4fcd478bae8cb39bf1b76f43d177c
9408b74edf28db331cd822fdbd2f188451b60e610abb798d61838bcdf4dd6444
9f0885e9e7a00505f9c82da78a5ec8578202258ad8e6e8930899790f3d1f0f6d
fc90a81b7f8c21467a4c196b0b523a09f93cea13db51da2892f0fc3dbf8ac520