santanderios.com.swtest.ru
Open in
urlscan Pro
77.222.40.224
Malicious Activity!
Public Scan
Effective URL: http://santanderios.com.swtest.ru/es/es/login.php
Submission: On October 01 via manual from ES — Scanned from ES
Summary
This is the only time santanderios.com.swtest.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 2606:4700:303... 2606:4700:3034::ac43:d11a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:7b60 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 12 | 77.222.40.224 77.222.40.224 | 44112 (SWEB-AS) (SWEB-AS) | |
12 | 3 |
ASN44112 (SWEB-AS, RU)
PTR: vh293.sweb.ru
santanderios.com.swtest.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
swtest.ru
3 redirects
santanderios.com.swtest.ru |
773 KB |
3 |
umu.link
1 redirects
umu.link |
2 KB |
1 |
cloudflare.com
www.cloudflare.com — Cisco Umbrella Rank: 6760 |
463 B |
12 | 3 |
Domain | Requested by | |
---|---|---|
12 | santanderios.com.swtest.ru |
3 redirects
umu.link
santanderios.com.swtest.ru |
3 | umu.link |
1 redirects
umu.link
|
1 | www.cloudflare.com |
umu.link
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-07-09 - 2023-07-09 |
a year | crt.sh |
www.cloudflare.com Cloudflare Inc ECC CA-3 |
2022-09-27 - 2023-09-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://santanderios.com.swtest.ru/es/es/login.php
Frame ID: 09710253F28D4C93552AAA0C5CA11AA3
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
SantanderPage URL History Show full URLs
- https://umu.link/SAN28 Page URL
-
https://umu.link/SAN28
HTTP 302
http://santanderios.com.swtest.ru/es HTTP 301
http://santanderios.com.swtest.ru/es/ HTTP 302
http://santanderios.com.swtest.ru/es/es/index.php HTTP 302
http://santanderios.com.swtest.ru/es/es/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://umu.link/SAN28 Page URL
-
https://umu.link/SAN28
HTTP 302
http://santanderios.com.swtest.ru/es HTTP 301
http://santanderios.com.swtest.ru/es/ HTTP 302
http://santanderios.com.swtest.ru/es/es/index.php HTTP 302
http://santanderios.com.swtest.ru/es/es/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
SAN28
umu.link/ |
921 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
trace
www.cloudflare.com/cdn-cgi/ |
332 B 463 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2001:ac8:23:59::5e
umu.link/ip/ |
0 267 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
santanderios.com.swtest.ru/es/es/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
santanderios.com.swtest.ru/es/es/res/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jq.js
santanderios.com.swtest.ru/es/es/res/ |
87 KB 31 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
santanderios.com.swtest.ru/es/es/res/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error.png
santanderios.com.swtest.ru/es/es/res/ |
661 B 936 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
spy.php
santanderios.com.swtest.ru/es/es/ |
0 211 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
back1.jpg
santanderios.com.swtest.ru/es/es/res/ |
643 KB 643 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
normal.woff
santanderios.com.swtest.ru/es/es/res/ |
46 KB 46 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bold.ttf
santanderios.com.swtest.ru/es/es/res/ |
86 KB 47 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| $ function| jQuery function| putType function| login boolean| abort1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
umu.link/ | Name: .umuly Value: CfDJ8CgJ21ViNghKqjc0CMHihvxFzuRoFeS2xy%2Bu2MMGi0cmdm5Y27WsQn8KcwhgRLg8T6b6jvaEgQh2%2FyiGm%2F5Capq32WGWlUHnG7Bu4sPwDZCl1kqpFx3GTbOHF48FFJzpbAL0yj1KqrXq%2BK8k2qCKy8EZ5nUkATyxmKQsz4TBmjHb |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
santanderios.com.swtest.ru
umu.link
www.cloudflare.com
2606:4700:3034::ac43:d11a
2606:4700::6810:7b60
77.222.40.224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