up.xino.one
Open in
urlscan Pro
185.88.177.7
Malicious Activity!
Public Scan
Effective URL: https://up.xino.one/index1.html
Submission: On November 14 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 7th 2022. Valid for: 3 months.
This is the only time up.xino.one was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la Provincia de Buenos Aires (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 20 | 185.88.177.7 185.88.177.7 | 201691 (WEIDE) (WEIDE) | |
1 | 181.191.186.24 181.191.186.24 | 265806 (BANCO DE ...) (BANCO DE LA PROVINCIA DE BUENOS AIRES) | |
20 | 2 |
ASN265806 (BANCO DE LA PROVINCIA DE BUENOS AIRES, AR)
PTR: fuerzasolidaria.bpba.com.ar
www.bancoprovincia.com.ar |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
xino.one
1 redirects
up.xino.one |
97 KB |
1 |
bancoprovincia.com.ar
www.bancoprovincia.com.ar |
206 KB |
20 | 2 |
Domain | Requested by | |
---|---|---|
20 | up.xino.one |
1 redirects
up.xino.one
|
1 | www.bancoprovincia.com.ar |
up.xino.one
|
20 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
up.xino.one R3 |
2022-10-07 - 2023-01-05 |
3 months | crt.sh |
www.bancoprovincia.com.ar DigiCert SHA2 Extended Validation Server CA |
2022-01-03 - 2023-02-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://up.xino.one/index1.html
Frame ID: 0965238204F0EBAFF232B05893241F7E
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
ProvinciaPage URL History Show full URLs
-
https://up.xino.one/
HTTP 302
https://up.xino.one/index1.html Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://up.xino.one/
HTTP 302
https://up.xino.one/index1.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index1.html
up.xino.one/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new_Login-IN.css
up.xino.one/fes/ |
18 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new_footer-IN.css
up.xino.one/fes/ |
2 KB 665 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
up.xino.one/fes/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alphacube.css
up.xino.one/fes/ |
2 KB 547 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
keyboardstyle.css
up.xino.one/fes/ |
2 KB 613 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
baprol.png
up.xino.one/fes/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iconoTeclado.png
up.xino.one/fes/ |
336 B 366 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
left-top.gif
up.xino.one/fes/ |
171 B 254 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
top-middle.gif
up.xino.one/fes/ |
97 B 126 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
right-top.gif
up.xino.one/fes/ |
168 B 198 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame-left.gif
up.xino.one/fes/ |
64 B 93 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
progress.gif
up.xino.one/fes/ |
708 B 708 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame-right.gif
up.xino.one/fes/ |
64 B 90 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bottom-left-c.gif
up.xino.one/fes/ |
60 B 89 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bottom-middle.gif
up.xino.one/fes/ |
50 B 79 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bottom-right-c.gif
up.xino.one/fes/ |
61 B 90 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new_fonts.css
up.xino.one/fes/fonts/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BIP-fondo-login
www.bancoprovincia.com.ar/CDN/Get/ |
206 KB 206 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
up.xino.one/fes/ |
75 KB 75 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la Provincia de Buenos Aires (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
up.xino.one
www.bancoprovincia.com.ar
181.191.186.24
185.88.177.7
0c9c1f4c287d1e4542bf6c0e147c0f3e2fcd4b84fb2eed2669789b7470f1f32b
189e4d24e01e7572498302b0fe8e6c3bdd0a824584e0330cb3cc0027f5a097d2
1a12c858db2b05c64eb6ab9de27d2027b59364b7c808b75d435b60f4461b3215
1cb11467746e2e8660a4f6d4af7ef75ea19d0ae1a705b21027e4d873dcec6ab4
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
2d979c2fe12eb0b90dad3d94b0abac7cd952dfea98ef0096f69a795fc0044e9e
2f5f907de5f8a44bfe8ad191eedc6ff6d2f9f28fa16b7ffc5c343c748bf357d4
37a4e56c497e170de6e152bc479624eb8d7ccb35bad5a190f2fdb17ac699cffa
570cc8c3ea0377efbf1924eaf3aa542dd85f83d18bf8d9bf6c5d684a892f50a5
6cdd50c7458c276127349422f204a9e3717174ef8ce563042f5da98d861db726
71864183533ee14988450eeaf215aed760ac0dae04be8800a232ab006af4a153
75cbbf9bac1d65eaf997443bad9cde33b08ae003b042010bf0c1ad03ea1fb903
78fae385f82e0f286f63413ea5615bbb80ff89b8a22e46e567e5907b2c0b761d
98e128e3c574777942728df3fa33042914ae5663f63b1cbb96ccbdb55ba12828
9c7f268d94917eb9b455f644297c6a67ae118f15c0de788e940a895632c56688
a37f0f4e61e4a76af7d076a9f1f79c78feec3d0f5ac0c3e46f537b1bf1ffd3ae
a51f087efc0b73fd55c7d4619e7b0e1e32648bd7a428d4bcd4c1d62a3fc86c47
bda5a870e24c669d44829ca2ea60878d40f81918f622936488baf3e504f6296c
ceba8e058f030adda6ccf8e50ad1a2a5d4d806e8a2ef51adf4a1a83ff3804076