sacsantander.com
Open in
urlscan Pro
167.114.64.42
Malicious Activity!
Public Scan
Submission: On September 15 via automatic, source twitter_illegalFawn
Summary
This is the only time sacsantander.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 167.114.64.42 167.114.64.42 | 16276 (OVH) (OVH) | |
5 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
sacsantander.com
sacsantander.com |
148 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | sacsantander.com |
sacsantander.com
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://sacsantander.com/
Frame ID: 25597.1
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
sacsantander.com/ |
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tiopatas.css
sacsantander.com/css/ |
95 KB 95 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
sacsantander.com/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
two.png
sacsantander.com/img/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
one.png
sacsantander.com/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sacsantander.com
167.114.64.42
0ee3912c24e2447483e0d8c248ef3ae0d144dc180a7fc2bdcdd56f35bd96671f
1c95023167a72a1e7670a72c7d00b4adf659c522a3a4830c7f6e346cd25ffb80
6d46ef06b9d4d0c5c51b542d8c3bc1abd7bfc98be42dac127b653ff53c27a595
7a8fe02a8610a76e5d692d0646339492216af47764b2d315057f5cd5660f9f31
981b1cd9553ac126be664648169f9cb6ebaf4df35fd1f695614a4222e25e479b