URL: https://passecur-sg.com/PASS/html
Submission: On October 14 via manual from QA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 82.194.68.29, located in Spain and belongs to ACENS_AS (Spain) Hosting, housing and VPN services, ES. The main domain is passecur-sg.com.
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G2 on October 10th 2019. Valid for: a year.
This is the first time this domain was scanned on urlscan.io!

Verdict: Malicious (Score: 100/100) Show Details

  • urlscan - Score: 0
  • googlesafebrowsing - Score: 100 (1 resources matched) -
    social_engineering

Domain & IP information

IP Address AS Autonomous System
1 82.194.68.29 16371 (ACENS_AS ...)
1 1
Domain
Subdomains
Transfer
1 passecur-sg.com
369 B
1 1
Domain Requested by
1 passecur-sg.com
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
passecur-sg.com
Encryption Everywhere DV TLS CA - G2
2019-10-10 -
2020-10-09
a year

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
html
/PASS
260 B
369 B
Document
General
Full URL
https://passecur-sg.com/PASS/html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
82.194.68.29 , Spain, ASN16371 (ACENS_AS (Spain) Hosting, housing and VPN services, ES),
Reverse DNS
plw115.dns-servicio.com
Software
nginx /
Resource Hash
e20a038da148be521877cd03abde95e5abe4f328c8f9daab0abbc64b8fa2dabb

Request headers

:method
GET
:authority
passecur-sg.com
:scheme
https
:path
/PASS/html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
404
server
nginx
date
Mon, 14 Oct 2019 16:39:40 GMT
content-type
text/html
vary
Accept-Encoding
last-modified
Thu, 10 Oct 2019 13:38:03 GMT
etag
W/"104-5948e82c41371"
allow
GET, POST, HEAD
content-encoding
gzip

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

passecur-sg.com


82.194.68.29

e20a038da148be521877cd03abde95e5abe4f328c8f9daab0abbc64b8fa2dabb