gapminder.vc
Open in
urlscan Pro
93.113.174.122
Malicious Activity!
Public Scan
Submission: On April 21 via manual from RO — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 14th 2023. Valid for: 3 months.
This is the only time gapminder.vc was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 93.113.174.122 93.113.174.122 | 43927 (HOSTERION) (HOSTERION) | |
11 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
gapminder.vc
gapminder.vc |
506 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | gapminder.vc |
gapminder.vc
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.gapminder.nl R3 |
2023-03-14 - 2023-06-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://gapminder.vc/wp-admin/css/login/
Frame ID: 5CAACCFFC4151F4DE97A8B9FB052C55D
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
gapminder.vc/wp-admin/css/login/ |
22 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
gapminder.vc/wp-admin/css/A/css/Login/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
blue-ui.css
gapminder.vc/wp-admin/css/A/css/Login/ |
593 KB 65 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logon.css
gapminder.vc/wp-admin/css/A/css/Login/ |
109 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cleave.js
gapminder.vc/wp-admin/css/A/js/ |
91 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
gapminder.vc/wp-admin/css/A/js/ |
5 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wordmark-white.svg
gapminder.vc/wp-admin/css/A/img/ |
1 KB 1004 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.desktop.day.1.jpeg
gapminder.vc/wp-admin/css/A/img/ |
299 KB 300 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
regular.woff
gapminder.vc/wp-admin/css/A/fonts/OpenSans/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
semibold.woff
gapminder.vc/wp-admin/css/A/fonts/OpenSans/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dcefont.woff
gapminder.vc/wp-admin/css/A/fonts/other/ |
51 KB 52 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| Cleave function| clicked function| unclicked object| body object| fixed object| username object| password object| remember object| token object| tokenHide object| tokenInput object| submitBtn1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
gapminder.vc/ | Name: PHPSESSID Value: cd575cc25e74daf655954acc07f838d8 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gapminder.vc
93.113.174.122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