fundnexus.org
Open in
urlscan Pro
5.100.155.8
Malicious Activity!
Public Scan
Submission: On August 05 via manual from UY — Scanned from GB
Summary
TLS certificate: Issued by R10 on July 18th 2024. Valid for: 3 months.
This is the only time fundnexus.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la República Oriental del Uruguay (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 5.100.155.8 5.100.155.8 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
11 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 5.100.155-8.publicdomainregistry.com
fundnexus.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
fundnexus.org
fundnexus.org |
342 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | fundnexus.org |
fundnexus.org
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
fundnexus.org R10 |
2024-07-18 - 2024-10-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fundnexus.org/Brou/
Frame ID: 060B30FC68D2CD0D23B408097E7A89A7
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
fundnexus.org/Brou/ |
38 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lasfuentes.css
fundnexus.org/Brou/cerezo/ |
200 B 151 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
losiconos.css
fundnexus.org/Brou/cerezo/ |
59 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chuqui2.css
fundnexus.org/Brou/cerezo/ |
39 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
fundnexus.org/Brou/cerezo/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chuquiti.css
fundnexus.org/Brou/cerezo/ |
640 KB 146 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
elfondito.jpg
fundnexus.org/Brou/mex/ |
130 KB 130 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laflecha.svg
fundnexus.org/Brou/mex/ |
364 B 406 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
goterobook.woff2
fundnexus.org/Brou/cerezo/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
goteromedio.woff2
fundnexus.org/Brou/cerezo/ |
20 KB 20 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
fundnexus.org/ |
583 B 410 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la República Oriental del Uruguay (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fundnexus.org
5.100.155.8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