www.qoobo.it
Open in
urlscan Pro
104.21.20.182
Malicious Activity!
Public Scan
Submission: On February 19 via api from EE — Scanned from CH
Summary
TLS certificate: Issued by GTS CA 1P5 on January 9th 2024. Valid for: 3 months.
This is the only time www.qoobo.it was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Swiss Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 104.21.20.182 104.21.20.182 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 142.250.181.234 142.250.181.234 | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 52.92.160.192 52.92.160.192 | 16509 (AMAZON-02) (AMAZON-02) | |
16 | 5 |
ASN15169 (GOOGLE, US)
PTR: fra16s56-in-f10.1e100.net
fonts.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
qoobo.it
www.qoobo.it |
50 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 48 |
1 KB |
1 |
amazonaws.com
s3-us-west-2.amazonaws.com |
6 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3222 |
25 KB |
0 |
etorostatic.com
Failed
etoro-cdn.etorostatic.com Failed |
|
0 |
gstatic.com
Failed
fonts.gstatic.com Failed |
|
0 |
cloudflare.com
Failed
cdnjs.cloudflare.com Failed |
|
16 | 7 |
Domain | Requested by | |
---|---|---|
9 | www.qoobo.it |
www.qoobo.it
|
2 | fonts.googleapis.com |
www.qoobo.it
|
1 | s3-us-west-2.amazonaws.com |
www.qoobo.it
|
1 | stackpath.bootstrapcdn.com |
www.qoobo.it
|
0 | etoro-cdn.etorostatic.com Failed |
www.qoobo.it
|
0 | fonts.gstatic.com Failed |
fonts.googleapis.com
|
0 | cdnjs.cloudflare.com Failed |
www.qoobo.it
|
16 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
qoobo.it GTS CA 1P5 |
2024-01-09 - 2024-04-08 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-01-29 - 2024-04-22 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-01-28 - 2024-04-27 |
3 months | crt.sh |
*.s3-us-west-2.amazonaws.com Amazon RSA 2048 M01 |
2024-01-23 - 2024-12-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.qoobo.it/wp-content/ewww/se/
Frame ID: 2BA1C309D37B2D26D06D3D59C6832242
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Swiss PostDetected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.qoobo.it/wp-content/ewww/se/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 808 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
www.qoobo.it/wp-content/ewww/se/css/ |
58 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.qoobo.it/wp-content/ewww/se/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
masking-input.js
s3-us-west-2.amazonaws.com/s.cdpn.io/3/ |
6 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
swiis-logo.png
www.qoobo.it/wp-content/ewww/se/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
789655.png
www.qoobo.it/wp-content/ewww/se/img/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
www.qoobo.it/wp-content/ewww/se/img/ |
597 B 887 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
www.qoobo.it/wp-content/ewww/se/img/ |
572 B 861 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
www.qoobo.it/wp-content/ewww/se/img/ |
564 B 878 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
www.qoobo.it/wp-content/ewww/se/img/ |
657 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
cleave.min.js
cdnjs.cloudflare.com/ajax/libs/cleave.js/1.6.0/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 517 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
pxiEyp8kv8JHgFVrJJfecnFHGPc.woff2
fonts.gstatic.com/s/poppins/v20/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sprite-payment.png
etoro-cdn.etorostatic.com/web-client/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdnjs.cloudflare.com
- URL
- https://cdnjs.cloudflare.com/ajax/libs/cleave.js/1.6.0/cleave.min.js
- Domain
- fonts.gstatic.com
- URL
- https://fonts.gstatic.com/s/poppins/v20/pxiEyp8kv8JHgFVrJJfecnFHGPc.woff2
- Domain
- etoro-cdn.etorostatic.com
- URL
- https://etoro-cdn.etorostatic.com/web-client/img/sprite-payment.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Swiss Post (Transportation)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| InputMask object| inputMask string| property undefined| cleave function| isInputNumber1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.qoobo.it/ | Name: PHPSESSID Value: 694pm9setnmaggpuc2qoakj571 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
etoro-cdn.etorostatic.com
fonts.googleapis.com
fonts.gstatic.com
s3-us-west-2.amazonaws.com
stackpath.bootstrapcdn.com
www.qoobo.it
cdnjs.cloudflare.com
etoro-cdn.etorostatic.com
fonts.gstatic.com
104.18.11.207
104.21.20.182
142.250.181.234
52.92.160.192
1dd20181a733ac6bad0e65d39105cd1fe1bdd5cb9f68341a82d7a206310a1290
255ac343be8acf31ca3debe1a89ecfeb7bf7949ca9bfcce726ec20db90d4ff71
441985bca86f350bd89721c5219dbcee393f2d9b206930ba3997919a1f4d2e9c
490ed4cd487facdb15cde073a96adbb1abf8912ddbfa22fd04a22c70a3326560
5397809adb99bdd5f4bd3dbfaadb6749e1d356fc9526890c005f36ac212d0761
5b0fbe5b7ad705f6a937c4998ad02f73d8f0d976fe231b74aef0ec996990c93a
5eb35f04e9f27358da6d4d10c8cab27641286f9d01268388afbde24175a26d8b
a6d98908dc979e12f29673659f3e4462a4fd97c00fa07acda6e126a03b81ad85
aeaef97bf18d2484c113638fd359453729988db56c23f6f90370ce07542f8c8f
af1e6edc875a382b338bb25bd7c5c3f474a7f1b36212002a5896dd06f2186325
b07b4ba931d2ff580554dec6bcdad83977282139a2c2278df7b37eeb811c9ade
cfaaaf453532e7ad6fbbfe5860bbfa41d6f310f256743360aebf86091f54efcd
e3ad63fa7034173bd38e8f9de3159a8787e10dc2faaf4c45556e080fa175e195