intensanpaolo.mypi.co
Open in
urlscan Pro
195.22.153.146
Malicious Activity!
Public Scan
Effective URL: https://intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/
Submission: On August 13 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 12th 2022. Valid for: 3 months.
This is the only time intensanpaolo.mypi.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banca Intesa Sanpaolo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 195.22.153.146 195.22.153.146 | 47196 (GARANT-PA...) (GARANT-PARK-INTERNET) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
mypi.co
1 redirects
intensanpaolo.mypi.co |
2 MB |
8 | 1 |
Domain | Requested by | |
---|---|---|
9 | intensanpaolo.mypi.co |
1 redirects
intensanpaolo.mypi.co
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
intensanpaolo.mypi.co R3 |
2022-08-12 - 2022-11-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/
Frame ID: 1B0A17B4C797E1AEB2FD32AACF57F5AE
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Banca Intesa Sanpaolo - Conto Corrente per Famiglie, Giovani e AziendePage URL History Show full URLs
-
http://intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/
HTTP 301
https://intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/
HTTP 301
https://intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/ Redirect Chain
|
13 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.css
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/css/ |
1 MB 1 MB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-intesasanpaolo.png
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
freccia_dx.png
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/images/ |
579 B 893 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ispfont.woff
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/fonts/ |
695 KB 695 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular.woff2
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/fonts/ |
14 KB 14 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Semibold.woff2
intensanpaolo.mypi.co/aca87b384f17392a60ed28f8b348772c/fonts/ |
14 KB 14 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banca Intesa Sanpaolo (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| submiteCC0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
intensanpaolo.mypi.co
195.22.153.146
0130c3c398e9a41a9f5ce8566ef6d7e769128c4c87258fd6f9faa0035cd4cae0
3b98b0dc3bed9d40f43e64adba5de47c76895338a96f0a5a314676cd6287eca9
559bde803d8dedb905509859f3c1d14c9837788f2d5cf6ee26f1518f528d0cf8
9fab2b237ba05268e8e0d77e73327fe088598d1c787f41483ae1deff2f191ab1
a10b79ec999c143df4db5b2bafad15b4817e78507ab9847a396525f465b1eb21
c646bc9d21fc52ac9305eb5362ebcc9f5b96d1db3b73498c091647d1ba8bb7e5
d61b45b8b3cded238a65ee0aac4043b989f11cee56acfe5c889777f961f241a2