pontosjulhos.com
Open in
urlscan Pro
2606:4700:3036::ac43:8780
Malicious Activity!
Public Scan
Effective URL: https://pontosjulhos.com/webapps_aplicationhome.php?tipocliente=fisico&segmento=emp&pk_vid=db4b285e4b875c5b15775987172829...
Submission: On July 25 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by E1 on July 22nd 2022. Valid for: 3 months.
This is the only time pontosjulhos.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Bradesco (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 2606:4700:303... 2606:4700:3036::ac43:8780 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:827::200a | 15169 (GOOGLE) (GOOGLE) | |
14 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
pontosjulhos.com
1 redirects
pontosjulhos.com |
195 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 303 |
30 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
14 | pontosjulhos.com |
1 redirects
pontosjulhos.com
|
1 | ajax.googleapis.com |
pontosjulhos.com
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.pontosjulhos.com E1 |
2022-07-22 - 2022-10-20 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-07-04 - 2022-09-26 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://pontosjulhos.com/webapps_aplicationhome.php?tipocliente=fisico&segmento=emp&pk_vid=db4b285e4b875c5b157759871728298d&v=2.13.6
Frame ID: B749B51F4439D1BFBB6C934826F0EDE0
Requests: 10 HTTP requests in this frame
Frame:
https://pontosjulhos.com/iframes/index.php
Frame ID: A9B3622323DD2948EBE14A9406A3EFCD
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Banco Bradesco | Pessoa FĂsica, Exclusive, Prime e PrivatePage URL History Show full URLs
-
http://pontosjulhos.com/webapps_aplicationhome.php?tipocliente=fisico&segmento=emp&pk_vid=db4b285e4b...
HTTP 301
https://pontosjulhos.com/webapps_aplicationhome.php?tipocliente=fisico&segmento=emp&pk_vid=db4b285e4b... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://pontosjulhos.com/webapps_aplicationhome.php?tipocliente=fisico&segmento=emp&pk_vid=db4b285e4b875c5b157759871728298d&v=2.13.6
HTTP 301
https://pontosjulhos.com/webapps_aplicationhome.php?tipocliente=fisico&segmento=emp&pk_vid=db4b285e4b875c5b157759871728298d&v=2.13.6 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
webapps_aplicationhome.php
pontosjulhos.com/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
pontosjulhos.com/css/ |
142 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mobile.css
pontosjulhos.com/css/ |
1 KB 911 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
valida_conta.js
pontosjulhos.com/js/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
avatar.png
pontosjulhos.com/img/ |
85 KB 86 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
rodape.jpg
pontosjulhos.com/img/ |
5 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.js
pontosjulhos.com/js/ |
73 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
padrao_mk.js
pontosjulhos.com/js/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.php
pontosjulhos.com/iframes/ Frame A9B3 |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
btnEnviar.jpg
pontosjulhos.com/img/ |
56 KB 57 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
pontosjulhos.com/bootstrap/css/ Frame A9B3 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap-theme.min.css
pontosjulhos.com/bootstrap/css/ Frame A9B3 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
pontosjulhos.com/bootstrap/js/ Frame A9B3 |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Bradesco (Banking)32 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| Apenas_Numeros function| VerificaLogin function| ValidaLogin function| ValidaDigito function| Verificar function| checa_agencia function| seguranca_b function| ProcuraObjeto function| controle function| lyrVisual function| mOut function| onMouseOut undefined| tempo number| ns number| ie string| oldId function| ssa function| $ function| jQuery object| bootstrap function| mascaraMike function| pulacampo function| SomenteNumero0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
pontosjulhos.com
2606:4700:3036::ac43:8780
2a00:1450:4001:827::200a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