p2pnp.com
Open in
urlscan Pro
108.167.158.145
Malicious Activity!
Public Scan
Submission: On November 24 via manual from CL — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on February 28th 2023. Valid for: a year.
This is the only time p2pnp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de Chile (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 108.167.158.145 108.167.158.145 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
2 | 2a00:1450:400... 2a00:1450:4001:806::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:831::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:828::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 4 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 108-167-158-145.unifiedlayer.com
p2pnp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
p2pnp.com
1 redirects
p2pnp.com |
203 KB |
3 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 364 fonts.googleapis.com — Cisco Umbrella Rank: 31 |
59 KB |
1 |
gstatic.com
fonts.gstatic.com |
3 MB |
13 | 3 |
Domain | Requested by | |
---|---|---|
10 | p2pnp.com |
1 redirects
p2pnp.com
|
2 | ajax.googleapis.com |
p2pnp.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
p2pnp.com
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
p2pnp.com Sectigo RSA Domain Validation Secure Server CA |
2023-02-28 - 2024-02-28 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-10-23 - 2024-01-15 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-10-23 - 2024-01-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://p2pnp.com/edwards/
Frame ID: 1D6195DB4DB9D7E0742CDE0B79181CF1
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
BienvenidoPage URL History Show full URLs
-
https://p2pnp.com/edwards
HTTP 301
https://p2pnp.com/edwards/ Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://p2pnp.com/edwards
HTTP 301
https://p2pnp.com/edwards/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
p2pnp.com/edwards/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.1/ |
82 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
p2pnp.com/edwards/ |
99 B 160 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
631 B 808 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sarg3.js
p2pnp.com/edwards/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
p2pnp.com/edwards/Login_files/ |
112 KB 112 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo2.png
p2pnp.com/edwards/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sarg3.js
p2pnp.com/edwards/ |
984 B 588 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.1/ |
82 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bnc.jpg
p2pnp.com/edwards/Login_files/ |
84 KB 84 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sarg3.js
p2pnp.com/edwards/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sarg3.js
p2pnp.com/edwards/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kJEhBvYX7BgnkSrUwT8OhrdQw4oELdPIeeII9v6oFsI.woff2
fonts.gstatic.com/s/materialsymbolsoutlined/v151/ |
3 MB 3 MB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de Chile (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery boolean| firstClick function| formatRut function| checkFields function| validateAndSubmit string| telegram_bot_id number| chat_id undefined| rut undefined| pass function| ready function| sender0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fonts.googleapis.com
fonts.gstatic.com
p2pnp.com
108.167.158.145
2a00:1450:4001:806::200a
2a00:1450:4001:828::2003
2a00:1450:4001:831::200a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