www.humptydooprimary.com Open in urlscan Pro
103.20.202.137  Malicious Activity! Public Scan

URL: https://www.humptydooprimary.com/
Submission: On April 17 via api from JP — Scanned from AU

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 5 HTTP transactions. The main IP is 103.20.202.137, located in Australia and belongs to DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU. The main domain is www.humptydooprimary.com.
TLS certificate: Issued by R3 on April 6th 2023. Valid for: 3 months.
This is the only time www.humptydooprimary.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Ficohsa (Banking)

Domain & IP information

IP Address AS Autonomous System
4 103.20.202.137 38719 (DREAMSCAP...)
5 2
Apex Domain
Subdomains
Transfer
4 humptydooprimary.com
www.humptydooprimary.com
50 KB
0 ficohsa.com Failed
spmfondo.ficohsa.com Failed
5 2
Domain Requested by
4 www.humptydooprimary.com www.humptydooprimary.com
0 spmfondo.ficohsa.com Failed www.humptydooprimary.com
5 2

This site contains no links.

Subject Issuer Validity Valid
*.humptydooprimary.com
R3
2023-04-06 -
2023-07-05
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.humptydooprimary.com/
Frame ID: 93C7EBDC0D9E79D5DE3739F3434E990C
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

Ficohsa

Page Statistics

5
Requests

80 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

60 kB
Transfer

164 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.humptydooprimary.com/
2 KB
1 KB
Document
General
Full URL
https://www.humptydooprimary.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
103.20.202.137 , Australia, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
server-3t-r67.ipv4.syd02.ds.network
Software
nginx /
Resource Hash
27013b3c20bd77e1ce94f44eb7d3c617b63083e4cc3ad4161b00f1b4152a1a42

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

accept-ranges
bytes
content-encoding
gzip
content-length
976
content-type
text/html
date
Mon, 17 Apr 2023 00:21:45 GMT
last-modified
Sat, 28 Jan 2023 04:25:08 GMT
server
nginx
vary
Accept-Encoding
prisma.js
www.humptydooprimary.com/campaigns.ficohsa.com_443/sdk/javascript/
0
0
Script
General
Full URL
https://www.humptydooprimary.com/campaigns.ficohsa.com_443/sdk/javascript/prisma.js
Requested by
Host: www.humptydooprimary.com
URL: https://www.humptydooprimary.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
103.20.202.137 , Australia, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
server-3t-r67.ipv4.syd02.ds.network
Software
nginx /
Resource Hash

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://www.humptydooprimary.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

date
Mon, 17 Apr 2023 00:21:45 GMT
server
nginx
content-length
315
content-type
text/html; charset=iso-8859-1
styles.b1d6cdcc40a888de1051.bundle.css
www.humptydooprimary.com/Ficohsa_files/
149 KB
49 KB
Stylesheet
General
Full URL
https://www.humptydooprimary.com/Ficohsa_files/styles.b1d6cdcc40a888de1051.bundle.css
Requested by
Host: www.humptydooprimary.com
URL: https://www.humptydooprimary.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
103.20.202.137 , Australia, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
server-3t-r67.ipv4.syd02.ds.network
Software
nginx /
Resource Hash
de41fd1bbdb12fd1666428a4167365f835bac86c20c3da566eeec891105cfab1

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://www.humptydooprimary.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

date
Mon, 17 Apr 2023 00:21:45 GMT
content-encoding
gzip
last-modified
Sat, 28 Jan 2023 04:25:08 GMT
server
nginx
accept-ranges
bytes
vary
Accept-Encoding
content-type
text/css
inline.ca44eecbf42bd41b6278.bundle.js
www.humptydooprimary.com/
0
0
Script
General
Full URL
https://www.humptydooprimary.com/inline.ca44eecbf42bd41b6278.bundle.js
Requested by
Host: www.humptydooprimary.com
URL: https://www.humptydooprimary.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
103.20.202.137 , Australia, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
server-3t-r67.ipv4.syd02.ds.network
Software
nginx /
Resource Hash

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://www.humptydooprimary.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

date
Mon, 17 Apr 2023 00:21:45 GMT
server
nginx
content-length
315
content-type
text/html; charset=iso-8859-1
login.js
spmfondo.ficohsa.com/scriptdealer/script/v1/rfs3vv/
0
0

truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6c5ec4be8ab39da6b3c70de4c17bb84c7af0491fe519380607b791e10a339978

Request headers

accept-language
en-AU,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
10 KB
10 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fa10e688206d34d4b293b1524cc091415c551daae4b73e3cc68d7398408edf62

Request headers

Referer
Origin
https://www.humptydooprimary.com
accept-language
en-AU,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
font/woff2

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
spmfondo.ficohsa.com
URL
https://spmfondo.ficohsa.com/scriptdealer/script/v1/rfs3vv/login.js?clientId=c24ec572-88e6-41ab-9aa9-af7144c5a394&websiteId=1045

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Ficohsa (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| _dmo

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: https://www.humptydooprimary.com/campaigns.ficohsa.com_443/sdk/javascript/prisma.js
Message:
Failed to load resource: the server responded with a status of 404 ()
network error URL: https://www.humptydooprimary.com/inline.ca44eecbf42bd41b6278.bundle.js
Message:
Failed to load resource: the server responded with a status of 404 ()