obloong.pl
Open in
urlscan Pro
144.76.189.18
Malicious Activity!
Public Scan
Effective URL: http://obloong.pl/icekanchono/nbbnhill/index.php
Submission: On May 04 via automatic, source openphish
Summary
This is the only time obloong.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 190.54.38.78 190.54.38.78 | 6429 (Telmex Ch...) (Telmex Chile Internet S.A.) | |
3 | 144.76.189.18 144.76.189.18 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 | 217.70.184.50 217.70.184.50 | 29169 (GANDI-AS ...) (GANDI-AS Domain name registrar - http://www.gandi.net) | |
5 | 3 |
ASN29169 (GANDI-AS Domain name registrar - http://www.gandi.net, FR)
PTR: webredir.vip.gandi.net
none.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
obloong.pl
obloong.pl |
982 KB |
1 |
none.com
none.com |
1 KB |
1 |
ingedent.cl
www.ingedent.cl |
650 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
3 | obloong.pl |
obloong.pl
|
1 | none.com |
obloong.pl
|
1 | www.ingedent.cl | |
5 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://obloong.pl/icekanchono/nbbnhill/index.php
Frame ID: 66E2DC4AF88D340F6DFD5F5BDAAFE199
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.ingedent.cl/maxst/jantanlaats.php?platform=hootsuite Page URL
- http://obloong.pl/icekanchono/nbbnhill/index.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
- headers server /php\/?([\d.]+)?/i
Windows Server (Operating Systems) Expand
Detected patterns
- headers server /Win32|Win64/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.ingedent.cl/maxst/jantanlaats.php?platform=hootsuite Page URL
- http://obloong.pl/icekanchono/nbbnhill/index.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
jantanlaats.php
www.ingedent.cl/maxst/ |
396 B 650 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.php
obloong.pl/icekanchono/nbbnhill/ |
7 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
11.png
obloong.pl/icekanchono/nbbnhill/img/ |
979 KB 979 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
obloong.pl/icekanchono/nbbnhill/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
none.com/ |
0 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
none.com
obloong.pl
www.ingedent.cl
144.76.189.18
190.54.38.78
217.70.184.50
05370c15c1f81360da50a1903da75c3d35695925ed074b9705c6639a2c2ae4a3
28efa050c0491c0e028b2a3067bc9e6ff96590112edbaeab19c3e79c13425c00
d523357dabdf6e70a2edfc54260dc3840d89534bf9c96d8716bdc4595a669155
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ebeeb2dd25057f7f64595b5410132259b14eb0d67238a1cac5407966cdf2f8e3