fuegoydelicia.mx
Open in
urlscan Pro
107.161.67.132
Malicious Activity!
Public Scan
Submission: On March 17 via api from US — Scanned from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on December 29th 2022. Valid for: 3 months.
This is the only time fuegoydelicia.mx was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Credit Agricole (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 107.161.67.132 107.161.67.132 | 32613 (IWEB-AS) (IWEB-AS) | |
1 | 2606:4700::68... 2606:4700::6810:7eaf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
fuegoydelicia.mx
fuegoydelicia.mx |
187 KB |
1 |
unpkg.com
unpkg.com — Cisco Umbrella Rank: 754 |
4 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | fuegoydelicia.mx |
fuegoydelicia.mx
|
1 | unpkg.com |
fuegoydelicia.mx
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
fuegoydelicia.mx cPanel, Inc. Certification Authority |
2022-12-29 - 2023-03-29 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-01 - 2023-06-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://fuegoydelicia.mx/index.php
Frame ID: D3D690370A22F76A15E085072AF2E2C1
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Pure CSS (Web Frameworks) Expand
Detected patterns
- <link[^>]+(?:([\d.])+/)?pure(?:-min)?\.css
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
fuegoydelicia.mx/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
fuegoydelicia.mx/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pure-min.css
unpkg.com/purecss@2.0.5/build/ |
16 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-latest.min.js
fuegoydelicia.mx/ |
84 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoc.png
fuegoydelicia.mx/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sotto.jpg
fuegoydelicia.mx/ |
36 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
foto.jpg
fuegoydelicia.mx/ |
59 KB 59 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Credit Agricole (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
fuegoydelicia.mx/ | Name: COOKIE_KEY Value: 167906612748 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fuegoydelicia.mx
unpkg.com
107.161.67.132
2606:4700::6810:7eaf
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2d0b11cc95b046dabdab9a5bbe9c3035d2db1d7036e644acbb9e00b7c639f3f6
35e1bc720a194b290556e1e2b62edcc93ac1d6fd4289fda81b62174f5c98dd2d
d57edbd36128c976720c04e0da287ea8b06c0f35af670721f3b84f4a9e3cbe04
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
db60f08c6342579c4dc8a9571045b2ec88e1f02015d797a243fe589913bb75d3
f95c5d58bbabff5fd995e5e0eb1fe33f3666767f9588a10435d049c58bded083