barclays.iportal-update.net
Open in
urlscan Pro
2a06:98c1:3120::c
Malicious Activity!
Public Scan
Submission: On February 03 via manual from GB — Scanned from NL
Summary
This is the only time barclays.iportal-update.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 2a06:98c1:312... 2a06:98c1:3120::c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
iportal-update.net
2 redirects
barclays.iportal-update.net |
31 KB |
0 |
cloudflare.com
Failed
performance.radar.cloudflare.com Failed |
|
9 | 2 |
Domain | Requested by | |
---|---|---|
9 | barclays.iportal-update.net |
2 redirects
barclays.iportal-update.net
|
0 | performance.radar.cloudflare.com Failed |
barclays.iportal-update.net
|
9 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://barclays.iportal-update.net/
Frame ID: 5C023DE10A2CF49E26C30726440CD765
Requests: 8 HTTP requests in this frame
Frame:
https://barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1675411200
Frame ID: 1CB68F5A494E35EF2AFC05BD785B9131
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Access deniedPage URL History Show full URLs
- http://barclays.iportal-update.net/ Page URL
-
http://barclays.iportal-update.net/cdn-cgi/phish-bypass?atok=UhY7xvSqe2jTrAE7QNygWOeus_tl7_u_Jrl2_go6spE-167541...
HTTP 301
http://barclays.iportal-update.net/ Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://barclays.iportal-update.net/ Page URL
-
http://barclays.iportal-update.net/cdn-cgi/phish-bypass?atok=UhY7xvSqe2jTrAE7QNygWOeus_tl7_u_Jrl2_go6spE-1675416939-0-%2F
HTTP 301
http://barclays.iportal-update.net/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- http://barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1675411200 HTTP 302
- https://barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1675411200
- http://barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/pica.js HTTP 0
- https://barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/pica.js
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
barclays.iportal-update.net/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.errors.css
barclays.iportal-update.net/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-exclamation.png
barclays.iportal-update.net/cdn-cgi/images/ |
452 B 889 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
barclays.iportal-update.net/ Redirect Chain
|
6 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
errors.css
barclays.iportal-update.net/cdn-cgi/styles/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
beacon.js
performance.radar.cloudflare.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
external.png
barclays.iportal-update.net/cdn-cgi/images/ |
265 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
187 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
invisible.js
barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/alpha/ Frame 1CB6 Redirect Chain
|
35 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
pica.js
barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/ Frame 1CB6 Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- performance.radar.cloudflare.com
- URL
- https://performance.radar.cloudflare.com/beacon.js
- Domain
- barclays.iportal-update.net
- URL
- https://barclays.iportal-update.net/cdn-cgi/challenge-platform/h/b/scripts/pica.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontentvisibilityautostatechange2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.barclays.iportal-update.net/ | Name: __cf_mw_byp Value: UhY7xvSqe2jTrAE7QNygWOeus_tl7_u_Jrl2_go6spE-1675416939-0-/ |
|
.radar.cloudflare.com/ | Name: __cf_bm Value: iKY_Qdzumj0PF0XeJme6hg6az9U_jJalidsYrBeMRdk-1675416943-0-AbNubUkByWobR0cV5wfsPqKPLwrbk+BmSvldhag4LyhmCPQleGlgL1Bb7Zs3rxrxZ5ILgWMtrzp2DL9ZafbTtSE= |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
barclays.iportal-update.net
performance.radar.cloudflare.com
barclays.iportal-update.net
performance.radar.cloudflare.com
2a06:98c1:3120::c
2a06:98c1:3121::c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