www.sanclemente.cl Open in urlscan Pro
190.121.17.234  Malicious Activity! Public Scan

URL: https://www.sanclemente.cl/backup123/selama/data/china-mail/cn/comfirmations-compte.php
Submission Tags: phishing malicious Search All
Submission: On October 15 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 190.121.17.234, located in Futrono, Chile and belongs to Telefonica del Sur S.A., CL. The main domain is www.sanclemente.cl.
TLS certificate: Issued by R3 on September 24th 2022. Valid for: 3 months.
This is the only time www.sanclemente.cl was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 190.121.17.234 14117 (Telefonic...)
1 2001:4de0:ac1... 20446 (STACKPATH...)
2 3
Apex Domain
Subdomains
Transfer
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 677
29 KB
1 sanclemente.cl
www.sanclemente.cl
33 KB
2 2
Domain Requested by
1 code.jquery.com www.sanclemente.cl
1 www.sanclemente.cl
2 2

This site contains no links.

Subject Issuer Validity Valid
sanclemente.cl
R3
2022-09-24 -
2022-12-23
3 months crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2022-08-03 -
2023-07-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.sanclemente.cl/backup123/selama/data/china-mail/cn/comfirmations-compte.php
Frame ID: 6884CA4C725C874EDFD565A11A4D3636
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Connectez-vous à votre compte PayPal

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

2
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

62 kB
Transfer

305 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request comfirmations-compte.php
www.sanclemente.cl/backup123/selama/data/china-mail/cn/
216 KB
33 KB
Document
General
Full URL
https://www.sanclemente.cl/backup123/selama/data/china-mail/cn/comfirmations-compte.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
190.121.17.234 Futrono, Chile, ASN14117 (Telefonica del Sur S.A., CL),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
2589610a984ba0575d31a76f03e734fb63ec456d06e9d99bd64d6e79328151c4

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Encoding
gzip
Content-Length
33202
Content-Type
text/html; charset=UTF-8
Date
Sat, 15 Oct 2022 21:17:28 GMT
Keep-Alive
timeout=5, max=100
Server
Apache/2.4.29 (Ubuntu)
Vary
Accept-Encoding
jquery-2.2.4.min.js
code.jquery.com/
84 KB
29 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: www.sanclemente.cl
URL: https://www.sanclemente.cl/backup123/selama/data/china-mail/cn/comfirmations-compte.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:3b , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

Referer
https://www.sanclemente.cl/
Origin
https://www.sanclemente.cl
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36

Response headers

date
Sat, 15 Oct 2022 21:17:28 GMT
content-encoding
gzip
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
server
nginx
etag
W/"28feccc0-14e4a"
vary
Accept-Encoding
x-hw
1665868648.dop234.fr8.t,1665868648.cds051.fr8.hn,1665868648.cds140.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
29811
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

17 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| CardJs number| step function| showadress function| showcc function| showcompte function| endInfo

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

code.jquery.com
www.sanclemente.cl
190.121.17.234
2001:4de0:ac18::1:a:3b
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2589610a984ba0575d31a76f03e734fb63ec456d06e9d99bd64d6e79328151c4
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5