hack2world.net
Open in
urlscan Pro
199.188.200.225
Malicious Activity!
Public Scan
Submission: On March 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on June 4th 2021. Valid for: a year.
This is the only time hack2world.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Standard Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 199.188.200.225 199.188.200.225 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
14 | 1 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server267-3.web-hosting.com
hack2world.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
hack2world.net
hack2world.net |
226 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | hack2world.net |
hack2world.net
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
hack2world.net Sectigo RSA Domain Validation Secure Server CA |
2021-06-04 - 2022-06-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://hack2world.net/zack-world/gerfefff/xz-po/app/phone.php
Frame ID: B8CC22B7702481A8C1F36C0CD6C35C07
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Standard Bank Online BankingDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
phone.php
hack2world.net/zack-world/gerfefff/xz-po/app/ |
12 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
67 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
hack2world.net/zack-world/gerfefff/xz-po/libraries/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-black.png
hack2world.net/zack-world/gerfefff/xz-po/libraries/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-blue.png
hack2world.net/zack-world/gerfefff/xz-po/libraries/img/ |
943 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min-blessed49.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
303 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min-blessed45.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
425 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min-blessed44.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
104 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min-blessed41.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
240 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min-blessed40.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
324 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.min-blessed39.css
hack2world.net/zack-world/gerfefff/xz-po/libraries/css/ |
247 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bentonsans-regular-webfont.woff
hack2world.net/zack-world/gerfefff/xz-po/libraries/fonts/bentonsans/regular/ |
12 KB 12 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff
hack2world.net/zack-world/gerfefff/xz-po/libraries/fonts/ |
43 KB 44 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bentonsans-medium-webfont.woff
hack2world.net/zack-world/gerfefff/xz-po/libraries/fonts/bentonsans/medium/ |
12 KB 12 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Standard Bank (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| isInputNumber1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
hack2world.net/ | Name: PHPSESSID Value: 5b8e0ddbea32c6fafd6b613cc5faaae8 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
hack2world.net
199.188.200.225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