abasaya.com
Open in
urlscan Pro
148.163.88.168
Malicious Activity!
Public Scan
Submission: On April 03 via automatic, source openphish
Summary
This is the only time abasaya.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Barclays (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 148.163.88.168 148.163.88.168 | 53755 (IOFLOOD) (IOFLOOD - Input Output Flood LLC) | |
14 | 1 |
ASN53755 (IOFLOOD - Input Output Flood LLC, US)
PTR: we.love.servers.at.ioflood.com
abasaya.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
abasaya.com
abasaya.com |
183 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | abasaya.com |
abasaya.com
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://abasaya.com/js/barrrr/home/step2.html
Frame ID: C90AAEADF62078D7199078AAD281E230
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
Pure CSS (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+(?:([\d.])+\/)?pure(?:-min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
step2.html
abasaya.com/js/barrrr/home/ |
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pure-min.css
abasaya.com/js/barrrr/home/ |
17 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pi2.png
abasaya.com/js/barrrr/home/images/ |
47 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pi3.png
abasaya.com/js/barrrr/home/images/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log.png
abasaya.com/js/barrrr/home/images/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
man.png
abasaya.com/js/barrrr/home/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slide.png
abasaya.com/js/barrrr/home/images/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log2.png
abasaya.com/js/barrrr/home/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.png
abasaya.com/js/barrrr/home/images/ |
33 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
co.png
abasaya.com/js/barrrr/home/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
how.png
abasaya.com/js/barrrr/home/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sawa.png
abasaya.com/js/barrrr/home/images/ |
646 B 887 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logbu.png
abasaya.com/js/barrrr/home/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ste.png
abasaya.com/js/barrrr/home/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Barclays (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
abasaya.com
148.163.88.168
005e031f7fc0fc76ededef96a4871b60b6b7d38faa0bb94e503c148c01a996ec
0ca6861953c97fa23fd9268181c14f5a2f5d33f6e53bbca592e247daa0f00213
0d1e43b8f1bce34f672c17d2f4c007a9cac526405ccc22147a34e3b5ddab62bb
17ff6aa6bf8e6c96d3a97504133e17d727347020a4da25fc557669a74c628b27
255d6dfae2b0ab59f97774b8fe2a2c037e8550571af5299150cf8175ed71bac9
34a5884d1e0297b8b59aa9cd7f60c0607db10f5706f3d5cd63aefdc09e080ed8
4f0c9dc0db589d62dfdef59841f36ecffc70822de6773d12770a7326c566e23d
687245687238f01131e10236d9aef43c71621fc8f723cd6e6168415eb020add3
69ec02a2b598baf6a1fde1834d28ef9d73fae9483ca2b812c369b4af12cf2ebc
7736d1d9c51a8888b6620378b9591d253369c805c370152c860d377e35d595db
7c6b2fbfb1f5d174938bdb6c3708b16d80bc0582fee905c700672622efa526aa
9d13beeffdbdf6110b488e547aea65a1deab7782bd27b89054838b8c9a10391d
d33e91017c8e151401817374e7db62234160cd1fe206ee0f29455f6522a35f0a
e086cd4b6359239bb2015c49b1a230a0a230efdc5805b9f9dfc751b3253187c2