prevenciondelavadodedinero.com Open in urlscan Pro
163.172.75.16  Malicious Activity! Public Scan

URL: http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Submission: On May 25 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 163.172.75.16, located in France and belongs to Online SAS, FR. The main domain is prevenciondelavadodedinero.com.
This is the only time prevenciondelavadodedinero.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WeTransfer (Online)

Domain & IP information

IP Address AS Autonomous System
1 5 163.172.75.16 12876 (Online SAS)
4 1
Apex Domain
Subdomains
Transfer
5 prevenciondelavadodedinero.com
prevenciondelavadodedinero.com
626 KB
4 1
Domain Requested by
5 prevenciondelavadodedinero.com 1 redirects prevenciondelavadodedinero.com
4 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Frame ID: 4183673094A6154BED65BAFD370B7698
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://prevenciondelavadodedinero.com/file/wt/wt/sign-in HTTP 301
    http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

626 kB
Transfer

625 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://prevenciondelavadodedinero.com/file/wt/wt/sign-in HTTP 301
    http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Redirect Chain
  • http://prevenciondelavadodedinero.com/file/wt/wt/sign-in
  • http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
3 KB
3 KB
Document
General
Full URL
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Protocol
HTTP/1.1
Server
163.172.75.16 , France, ASN12876 (Online SAS, FR),
Reverse DNS
c0.iservidorweb.com
Software
Apache /
Resource Hash
288b5c1ae6610ae9c9ad6f85b4a47d62d10152cfe29e20ab60029684912c9c6d

Request headers

Host
prevenciondelavadodedinero.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 00:20:01 GMT
Server
Apache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Mon, 25 May 2020 00:20:01 GMT
Server
Apache
Location
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Content-Length
265
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
a.png
prevenciondelavadodedinero.com/file/wt/wt/sign-in/images/
619 KB
619 KB
Image
General
Full URL
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/images/a.png
Requested by
Host: prevenciondelavadodedinero.com
URL: http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Protocol
HTTP/1.1
Server
163.172.75.16 , France, ASN12876 (Online SAS, FR),
Reverse DNS
c0.iservidorweb.com
Software
Apache /
Resource Hash
8da76ebfcee02f1ec27e666a7a73b4dd88d69725691b93ffa85664d970f7894b

Request headers

Referer
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 00:20:02 GMT
Last-Modified
Mon, 15 Oct 2018 21:39:58 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
633852
b.png
prevenciondelavadodedinero.com/file/wt/wt/sign-in/images/
2 KB
2 KB
Image
General
Full URL
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/images/b.png
Requested by
Host: prevenciondelavadodedinero.com
URL: http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Protocol
HTTP/1.1
Server
163.172.75.16 , France, ASN12876 (Online SAS, FR),
Reverse DNS
c0.iservidorweb.com
Software
Apache /
Resource Hash
c9e47b8316f5cb2bf54507ea08591210bf99f9aa5e04d3ddeb9d3017852cee24

Request headers

Referer
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 00:20:02 GMT
Last-Modified
Mon, 15 Oct 2018 21:39:58 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1833
c.png
prevenciondelavadodedinero.com/file/wt/wt/sign-in/images/
916 B
1 KB
Image
General
Full URL
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/images/c.png
Requested by
Host: prevenciondelavadodedinero.com
URL: http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
Protocol
HTTP/1.1
Server
163.172.75.16 , France, ASN12876 (Online SAS, FR),
Reverse DNS
c0.iservidorweb.com
Software
Apache /
Resource Hash
e25bdd5bdea45135e14d2a45f1661e2980de31692fc51b7b0d16b0930117e96f

Request headers

Referer
http://prevenciondelavadodedinero.com/file/wt/wt/sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 25 May 2020 00:20:02 GMT
Last-Modified
Mon, 15 Oct 2018 21:39:58 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
916

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WeTransfer (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| unhideBody

0 Cookies