
Submission: On January 14 via automatic, source openphish
Summary
This is the only time itaacesslinkregulari-com.umbler.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 177.55.116.228 177.55.116.228 | 53057 (RedeHost ...) (RedeHost Internet Ltda.) | |
5 | 1 |
ASN53057 (RedeHost Internet Ltda., BR)
PTR:
itaacesslinkregulari-com.umbler.net |
Domain Subdomains |
Transfer | |
---|---|---|
6 |
umbler.net
1 redirects
|
636 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
6 | itaacesslinkregulari-com.umbler.net |
1 redirects
itaacesslinkregulari-com.umbler.net
|
5 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
Subject / Issuer | Validity | Valid |
---|
Screenshot

Detected technologies
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Stats
0
Requests
0
%
HTTPS
0
%
IPv6
0
Domains
0
Subdomains
0
IPs
0
Countries
0
kB
Transfer
0
kB
Size
0
Cookies
0 Outgoing links
These are links going to different origins than the main page. For each link, only the first name is shown.
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
/dados Redirect Chain
|
4 KB 4 KB |
Document text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
/dados/js |
85 KB 30 KB |
Script application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.min.js
/dados/js |
8 KB 4 KB |
Script application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_splash_logo.png
/dados/imagens |
8 KB 8 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_login_background.png
/dados/imagens |
595 KB 591 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Redirect requests
There were HTTP redirects (301, 302) for the following requests:
Request 0- http://itaacesslinkregulari-com.umbler.net/dados
- http://itaacesslinkregulari-com.umbler.net/dados/
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| $jscomp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
itaacesslinkregulari-com.umbler.net
177.55.116.228
0aaed71320dc122a42a59383acc7b8071ba4aa5c7c47d667773218b38c32b443
260b8ec5a0734d00266897b12e61e374300e98b1269e5982a0b040353f8a0a98
951e876241755f7e1c1b94bb5cf55ab0714367a8b43c571cdb7f25ad685a22a4
d30b6114fb9496ae46b2a8cdf59379c8ffdb957534bd1dd73e626c7c61c7e67d
d9baa0770a05bf2ba752864b0f27ed494397bf8c403829ce582ef35d378a9587