juka.com.ar
Open in
urlscan Pro
200.80.42.215
Malicious Activity!
Public Scan
Submission: On October 21 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 4th 2023. Valid for: 3 months.
This is the only time juka.com.ar was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Idaho Central Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 200.80.42.215 200.80.42.215 | 18747 (IFX18747) (IFX18747) | |
9 | 1 |
ASN18747 (IFX18747, US)
PTR: 215.42.80.200.host.ifxnw.com.ar
juka.com.ar |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
juka.com.ar
1 redirects
juka.com.ar |
48 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | juka.com.ar |
1 redirects
juka.com.ar
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmail.juka.com.ar R3 |
2023-10-04 - 2024-01-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://juka.com.ar/ICCU/
Frame ID: D05CA43170DFCF5A54EDAACF3986BF33
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Idaho Central Credit UnionPage URL History Show full URLs
-
https://juka.com.ar/ICCU
HTTP 301
https://juka.com.ar/ICCU/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://juka.com.ar/ICCU
HTTP 301
https://juka.com.ar/ICCU/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
juka.com.ar/ICCU/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
juka.com.ar/ICCU/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
responsive.css
juka.com.ar/ICCU/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Logo.svg
juka.com.ar/ICCU/asset/image/ |
12 KB 13 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fingerprint_white_24dp.svg
juka.com.ar/ICCU/asset/image/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atm_white_24dp.svg
juka.com.ar/ICCU/asset/image/ |
353 B 599 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
phone_iphone_white_24dp.svg
juka.com.ar/ICCU/asset/image/ |
362 B 608 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-store-badge.svg
juka.com.ar/ICCU/asset/image/ |
11 KB 11 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-play-badge.svg
juka.com.ar/ICCU/asset/image/ |
9 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Idaho Central Credit Union (Government)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
juka.com.ar
200.80.42.215
0def5fb8862f6fe90562892e06e0cda73fc5f7925e91acd8454ae5fac68b3f69
2dcf765854f1fe869b1674016feb1638870c1066f156f8d7dfd47b53d0dc093f
86c9954e1457d27db013c1f10a96ffaba845e5af7765c4ef9df4ac1549e47d67
8a812ea18e2aadb6ab117c882c2a308dbc7caa03933d7ae2525d17a8a26d96c0
a4c4c2bed7e4f0c6a48314576ba833291f488b56b6893f86fb167f3126c62c1e
c66306654db0ddc5897f5e83a8358c252d642965d51168a04faf1ef7b783cc90
e8d89b78acb56d224e80668866b59a59b7ad1b0f5cead536d2fe2941cac46306
f765a490485533899939e02bcdc5b7c68fa6e1401190bcf234407fd4defbb2c3
fb10c4e04f5ebef8d51bd2d78f3ad7e69fd8111a1c3f7d8503632c14bb301e42