www.dipolartao.com
Open in
urlscan Pro
106.52.65.155
Malicious Activity!
Public Scan
Effective URL: https://www.dipolartao.com/van/
Submission: On November 18 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 30th 2023. Valid for: 3 months.
This is the only time www.dipolartao.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 106.52.65.155 106.52.65.155 | 45090 (TENCENT-N...) (TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 193.127.210.129 193.127.210.129 | 2134 (GSVNET-AS...) (GSVNET-AS GS Virtual Network Produban) | |
11 | 4 |
ASN45090 (TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited, CN)
www.dipolartao.com |
ASN2134 (GSVNET-AS GS Virtual Network Produban, ES)
retail.santander.co.uk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
dipolartao.com
1 redirects
www.dipolartao.com |
236 KB |
1 |
santander.co.uk
retail.santander.co.uk — Cisco Umbrella Rank: 185960 |
35 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 223 |
29 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
10 | www.dipolartao.com |
1 redirects
cdnjs.cloudflare.com
www.dipolartao.com |
1 | retail.santander.co.uk |
www.dipolartao.com
|
1 | cdnjs.cloudflare.com |
www.dipolartao.com
|
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.dipolartao.com R3 |
2023-10-30 - 2024-01-28 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
retail.santander.co.uk Entrust Certification Authority - L1M |
2023-03-21 - 2024-04-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.dipolartao.com/van/
Frame ID: E9DE03879FE9A023E539B9F073057F8E
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Personal Online Banking: Log on or sign upPage URL History Show full URLs
-
http://www.dipolartao.com/van/
HTTP 301
https://www.dipolartao.com/van/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.dipolartao.com/van/
HTTP 301
https://www.dipolartao.com/van/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.dipolartao.com/van/ Redirect Chain
|
412 B 414 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/ |
90 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
___.php
www.dipolartao.com/van/ |
133 KB 53 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.dipolartao.com/van/ |
181 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ui-icon-fill-sms.png
www.dipolartao.com/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SMS@1x.svg
www.dipolartao.com/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
asset-3-3-x.png
retail.santander.co.uk/olb/app/logon/access/assets/images/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ui-icon-fill-sms.png
www.dipolartao.com/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
35 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SantanderTextW05-Regular.77501c6e88280139f847.ttf
www.dipolartao.com/van/ |
138 KB 69 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SantanderHeadlineW05-Rg.838addf7f1e08ecb31f9.ttf
www.dipolartao.com/van/ |
138 KB 69 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SMS@1x.svg
www.dipolartao.com/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery function| pub940l1m10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
retail.santander.co.uk
www.dipolartao.com
106.52.65.155
193.127.210.129
2606:4700::6811:190e
1bca034dc76dab33232d41f7f9705fced08c4b48c90e23bd737e4b610d1b6df8
3a1b7863c59caf1cb8c5e14792598b1504b15072ed91aac22d7b45e06e924c02
3c2c1fce0610e68f371c296f3717296e64ed7ca62cd66eb26f522123945bc9f5
3c34b516dc489a5ff3cb121a73b6cfc25ec0920394b2d3b742d30201e71e6e24
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
cf2166ed0037c6f2797c0774063ecc0275cd08473aeff74cf79dc510bb60398b
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e431861cec2a9c41b2e03e07ed1cfef11074199f2288ef09bd6b2ee4c58e881a
f700c3638638b62b07e614c8cae5665cf4bfa956452ab4e6fea5a15965fc40f7
f907fa84792244fe3cdf4bedb4c3a308d773e8a591a26886c8b1ada68bff0ff9