
www.dillandduggs.com
2606:4700:3037::ac43:cf8a
Malicious Activity!
Effective URL: https://www.dillandduggs.com/iber/iber/ef5448a9ad396e0/login.php
Submission: On October 02 via manual from ES
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 6th 2020. Valid for: a year.
This is the only time www.dillandduggs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Ibercaja Banco (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3036::ac43:baee | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 14 | 2606:4700:303... 2606:4700:3037::ac43:cf8a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:a823 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 3 |
ASN13335 (CLOUDFLARENET, US)
www.tapandkitchenphilly.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
dillandduggs.com
1 redirects
www.dillandduggs.com |
455 KB |
1 |
cloudflare.com
ajax.cloudflare.com |
5 KB |
1 |
tapandkitchenphilly.com
www.tapandkitchenphilly.com |
711 B |
15 | 3 |
Domain | Requested by | |
---|---|---|
14 | www.dillandduggs.com |
1 redirects
www.dillandduggs.com
ajax.cloudflare.com |
1 | ajax.cloudflare.com |
www.dillandduggs.com
|
1 | www.tapandkitchenphilly.com | |
15 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-07-07 - 2021-07-07 |
a year | crt.sh |
ajax.cloudflare.com DigiCert ECC Secure Server CA |
2020-08-11 - 2022-08-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.dillandduggs.com/iber/iber/ef5448a9ad396e0/login.php
Frame ID: 147A4B9231E745EE798A6CBAEC234625
Requests: 15 HTTP requests in this frame
Screenshot

Page URL History Show full URLs
- https://www.tapandkitchenphilly.com/1.html Page URL
-
https://www.dillandduggs.com/iber/iber/
HTTP 302
https://www.dillandduggs.com/iber/iber/ef5448a9ad396e0/login.php Page URL
Detected technologies

Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Detected patterns
- headers server /^cloudflare$/i

Detected patterns
- html /<script[^>]* src=[^>]+fontawesome(?:\.js)?/i
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
15
Requests
100
%
HTTPS
100
%
IPv6
3
Domains
3
Subdomains
3
IPs
1
Countries
460
kB
Transfer
1505
kB
Size
2
Cookies
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.tapandkitchenphilly.com/1.html Page URL
-
https://www.dillandduggs.com/iber/iber/
HTTP 302
https://www.dillandduggs.com/iber/iber/ef5448a9ad396e0/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
1.html
www.tapandkitchenphilly.com/ |
156 B 711 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
www.dillandduggs.com/iber/iber/ef5448a9ad396e0/ Redirect Chain
|
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
www.dillandduggs.com/iber/iber/assets/css/ |
152 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
helpers.css
www.dillandduggs.com/iber/iber/assets/css/ |
40 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.css
www.dillandduggs.com/iber/iber/assets/css/ |
3 KB 486 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
www.dillandduggs.com/iber/iber/assets/css/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
www.dillandduggs.com/iber/iber/assets/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.png
www.dillandduggs.com/iber/iber/assets/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer-logo.png
www.dillandduggs.com/iber/iber/assets/images/ |
1002 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rocket-loader.min.js
ajax.cloudflare.com/cdn-cgi/scripts/7089c43e/cloudflare-static/ |
12 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
www.dillandduggs.com/iber/iber/assets/js/ |
3 KB 770 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome.min.js
www.dillandduggs.com/iber/iber/assets/js/ |
1 MB 360 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
www.dillandduggs.com/iber/iber/assets/js/ |
133 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
www.dillandduggs.com/iber/iber/assets/js/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
www.dillandduggs.com/iber/iber/assets/js/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Ibercaja Banco (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| __cfQR function| $ function| jQuery function| Popper object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome boolean| isShift string| seperator string| dash function| cc_date function| date_of_birth boolean| __cfRLUnblockHandlers2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.dillandduggs.com/ | Name: PHPSESSID Value: uqo0mklbe77tlv2faqv0bgau6m |
|
.dillandduggs.com/ | Name: __cfduid Value: dfaf23bfaa86051185b5a2254e9a9dd9f1601627510 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.cloudflare.com
www.dillandduggs.com
www.tapandkitchenphilly.com
2606:4700:3036::ac43:baee
2606:4700:3037::ac43:cf8a
2606:4700::6810:a823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