jennysq.xyz
Open in
urlscan Pro
94.23.21.88
Malicious Activity!
Public Scan
Submission: On June 09 via automatic, source openphish
Summary
This is the only time jennysq.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tangerine Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 94.23.21.88 94.23.21.88 | 16276 (OVH) (OVH) | |
17 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
jennysq.xyz
jennysq.xyz |
57 KB |
17 | 1 |
Domain | Requested by | |
---|---|---|
17 | jennysq.xyz |
jennysq.xyz
|
17 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/login.php?cmd=login_submit
Frame ID: B425CFCCEE411AAD70D969CDE104B7F7
Requests: 17 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a1.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a2.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a4.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a5.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a6.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
deposit.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
head.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tanger.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a7.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a3.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cardnumb.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
860 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
662 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
forger.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
936 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
goto.png
jennysq.xyz/trpkj456IlIh_ok/Tang/f913a6469c07abd8bff733379f5673bd/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tangerine Bank (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jennysq.xyz
94.23.21.88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