pjsantarosalia.com
Open in
urlscan Pro
50.23.253.66
Malicious Activity!
Public Scan
Effective URL: https://pjsantarosalia.com/fedwire/Login.php?sslchannel=true
Submission: On December 03 via manual from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 6th 2019. Valid for: 3 months.
This is the only time pjsantarosalia.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Box.com (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 50.23.253.66 50.23.253.66 | 36351 (SOFTLAYER) (SOFTLAYER - SoftLayer Technologies Inc.) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:190::3114 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2606:4700:20:... 2606:4700:20::681a:46c | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 | 2a00:1450:400... 2a00:1450:4001:809::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
17 | 4 |
ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US)
PTR: serv.grupomegatel.com
pjsantarosalia.com |
ASN20940 (AKAMAI-ASN1, US)
store-images.s-microsoft.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
pjsantarosalia.com
pjsantarosalia.com |
381 KB |
2 |
gstatic.com
fonts.gstatic.com |
45 KB |
1 |
pngimg.com
pngimg.com |
22 KB |
1 |
s-microsoft.com
store-images.s-microsoft.com |
5 KB |
17 | 4 |
Domain | Requested by | |
---|---|---|
13 | pjsantarosalia.com |
pjsantarosalia.com
|
2 | fonts.gstatic.com | |
1 | pngimg.com |
pjsantarosalia.com
|
1 | store-images.s-microsoft.com |
pjsantarosalia.com
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pjsantarosalia.com cPanel, Inc. Certification Authority |
2019-11-06 - 2020-02-04 |
3 months | crt.sh |
store-images.microsoft.com Microsoft IT TLS CA 2 |
2018-02-20 - 2020-02-20 |
2 years | crt.sh |
*.google.com GTS CA 1O1 |
2019-11-05 - 2020-01-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pjsantarosalia.com/fedwire/Login.php?sslchannel=true
Frame ID: E134C3487B0F667F4A227CDF6B75F945
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://pjsantarosalia.com/fedwire/ Page URL
- https://pjsantarosalia.com/fedwire/Login.php?sslchannel=true Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://pjsantarosalia.com/fedwire/ Page URL
- https://pjsantarosalia.com/fedwire/Login.php?sslchannel=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
pjsantarosalia.com/fedwire/ |
113 B 553 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Login.php
pjsantarosalia.com/fedwire/ |
7 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css_yXMMnLSSpPunfPzrxqTY5Fxi0thyZrjewLEjqduzimc.css
pjsantarosalia.com/fedwire/assets/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css_whE_FIKmCdJjmQukMY5DBbmkss9qZjXENYcyIcR-90c.css
pjsantarosalia.com/fedwire/assets/css/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
pjsantarosalia.com/fedwire/assets/css/ |
4 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css_7jDhC7Vm4-oxtUbtZMHwD8LA2Gp2KNpvOzvod9283FA.css
pjsantarosalia.com/fedwire/assets/css/ |
202 KB 202 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apps.25144.13510798887489353.ba91417f-f0d9-447e-8437-1c100c23ade6.096b3123-c50e-4942-be9b-cb16e629d4de
store-images.s-microsoft.com/image/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email_PNG20.png
pngimg.com/uploads/email/ |
21 KB 22 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
AstraZeneca_0.png
pjsantarosalia.com/fedwire/assets/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PG_433x90.png
pjsantarosalia.com/fedwire/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GE.png
pjsantarosalia.com/fedwire/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Nationwide.png
pjsantarosalia.com/fedwire/assets/img/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Boston.png
pjsantarosalia.com/fedwire/assets/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Pandora.png
pjsantarosalia.com/fedwire/assets/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home_masthead_ipadonly.jpg
pjsantarosalia.com/fedwire/assets/img/ |
84 KB 84 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v14/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v14/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Box.com (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
pjsantarosalia.com/ | Name: PHPSESSID Value: j7n7uhejc1bfqbf75qkjms1u43 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubdomains; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.gstatic.com
pjsantarosalia.com
pngimg.com
store-images.s-microsoft.com
2606:4700:20::681a:46c
2a00:1450:4001:809::2003
2a02:26f0:6c00:190::3114
50.23.253.66
1670565574aab8aa0a287a4cd8f49cf0d8b0959ebe344f90ca8af696ede9c23b
2693186aa9644890b9d6858c4b784ccde2de3d26207b7703201efcc714e913f9
3470e4402c0cbe8c6eecae0dbb06a28fab1e4ec7958fb9ed311e230bc1ade564
72bec71587651312300449a7e61220994b46aff8079fc0517ca84e6f5ac55fbe
748195ac015cee91667a22f2e14e6f5b80985245f88c69f870cc757b517cfa21
818ba83870603d9695a9494b7215068689b7fe9153b8d57e9274fc46e72f975a
86a57a85f31ac7ee763d7f61891d5717db271799927d28481ded6a660ca4b4e6
88020844e8f50d7c9500f1e8307a1665cb43d5bb56484328b2b71f35fac1ea04
944961358121e68879546ff9defcc0db811870eebbc2e2a3fee5b42628bd80ed
988e7ea05e4b996a604b5055500051b9021d763be5aea15ac1146d83469896d4
a554cb8697bbff79dad0f9a171035d188e0827ce4b28fdd43e4362d3ab7f04f2
a80f6e04a6c9f0bd6349e8ffe05eeacae606ec98ccbecfa70c6312b5fa96f836
c2113f1482a609d263990ba4318e4305b9a4b2cf6a6635c435873221c47ef747
c6ea814b44549dcc420deb69ebf994e2c35e80d2ec8925647e611ab07e2d0ece
c9730c9cb492a4fba77cfcebc6a4d8e45c62d2d87266b8dec0b123a9dbb38a67
ead13ccfbdea5462c3af37aa6ae04e64ed65a31c33f76e46da5e86ec85c52064
ee30e10bb566e3ea31b546ed64c1f00fc2c0d86a7628da6f3b3be877ddbcdc50