www.fingerpos.com Open in urlscan Pro
103.11.188.172  Malicious Activity! Public Scan

URL: http://www.fingerpos.com/yuno/assets/plugins/bootstrap/gouv-fr21/gouv-fr/wyzzhnzk=/s2.html
Submission: On August 06 via automatic, source openphish — Scanned from SG

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 103.11.188.172, located in Singapore and belongs to DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU. The main domain is www.fingerpos.com.
This is the only time www.fingerpos.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Impots Gouv (Government)

Domain & IP information

IP Address AS Autonomous System
1 103.11.188.172 38719 (DREAMSCAP...)
1 2
Apex Domain
Subdomains
Transfer
1 fingerpos.com
www.fingerpos.com
67 KB
1 1
Domain Requested by
1 www.fingerpos.com
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.fingerpos.com/yuno/assets/plugins/bootstrap/gouv-fr21/gouv-fr/wyzzhnzk=/s2.html
Frame ID: 1B02D41CDD202EC9AFA44F2941DFF0F4
Requests: 3 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

67 kB
Transfer

115 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request s2.html
www.fingerpos.com/yuno/assets/plugins/bootstrap/gouv-fr21/gouv-fr/wyzzhnzk=/
67 KB
67 KB
Document
General
Full URL
http://www.fingerpos.com/yuno/assets/plugins/bootstrap/gouv-fr21/gouv-fr/wyzzhnzk=/s2.html
Protocol
HTTP/1.1
Server
103.11.188.172 , Singapore, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
v188172.serveradd.com
Software
Apache /
Resource Hash
5001d7cab88dafb7496cc965b83fc93a179a64315680cdb42781beff593ee50b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.170 Safari/537.36
accept-language
zh-SG,zh;q=0.9

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=0
Connection
Upgrade, Keep-Alive
Content-Length
68623
Content-Type
text/html
Date
Sun, 06 Aug 2023 22:17:48 GMT
Expires
Sun, 06 Aug 2023 22:17:48 GMT
Keep-Alive
timeout=10
Last-Modified
Fri, 21 Jul 2023 03:21:07 GMT
Server
Apache
Upgrade
h2
truncated
/
20 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a72279faf9877fafd58125dedc158c86564401968c104a0ae689c82d65c34257

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
http://www.fingerpos.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.170 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
28 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
91e2c78dc5c8719fa14bf3a01866dd64eff87a76a4a80da3f621571cf7f832ca

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
http://www.fingerpos.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.170 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Impots Gouv (Government)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.fingerpos.com
103.11.188.172
5001d7cab88dafb7496cc965b83fc93a179a64315680cdb42781beff593ee50b
91e2c78dc5c8719fa14bf3a01866dd64eff87a76a4a80da3f621571cf7f832ca
a72279faf9877fafd58125dedc158c86564401968c104a0ae689c82d65c34257