ccelp.bo
Open in
urlscan Pro
162.215.11.207
Malicious Activity!
Public Scan
Submission: On May 16 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 27th 2023. Valid for: 3 months.
This is the only time ccelp.bo was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Nexi (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 162.215.11.207 162.215.11.207 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2 |
Domain | Requested by | |
---|---|---|
1 | ccelp.bo | |
1 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ccelp.bo R3 |
2023-03-27 - 2023-06-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ccelp.bo/fofat/login/smserror.php
Frame ID: F9CA39FE783856EDE9688563A48D70D9
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
smserror.php
ccelp.bo/fofat/login/ |
44 KB 44 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
117 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
168 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
783 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Nexi (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| savepage_ShadowLoader0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ccelp.bo
162.215.11.207
11a3cd8750243a969866727e190836c34d28eb5caadfaa695301017a0cea9336
3fab35f5fdcc997537fea0236e0acc6dc55d066b6da582dbbd587b817d93733f
4d5af69cae0f1a439e42e670013d3d0c59a0c1da7a1a5f46ee306f1c21dc5585
e4c4c3ce81202eeeb53d98d87a9d9bceaacf54216404a8835009fde7718005fc
f7b1d9b7874c2d61cde2043a51acb7ac1a179471fd84152eafe7daa425d2e94f
fd8dac12f556497a48ce63c3c656ca90944c6c92e47eb2622d01a70acc83528d