www.pagamento-secure.com
Open in
urlscan Pro
162.241.2.166
Malicious Activity!
Public Scan
Effective URL: https://www.pagamento-secure.com/Soft-App/fatturazione/
Submission: On April 30 via api from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on April 30th 2020. Valid for: 3 months.
This is the only time www.pagamento-secure.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banca Sella (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 209.88.90.11 209.88.90.11 | 37204 (TELONE) (TELONE) | |
13 | 162.241.2.166 162.241.2.166 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
13 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: mx64.hostgator.mx
www.pagamento-secure.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
pagamento-secure.com
www.pagamento-secure.com |
53 KB |
1 |
mines.gov.zw
1 redirects
www.mines.gov.zw |
311 B |
13 | 2 |
Domain | Requested by | |
---|---|---|
13 | www.pagamento-secure.com |
www.pagamento-secure.com
|
1 | www.mines.gov.zw | 1 redirects |
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pagamento-secure.com Sectigo RSA Domain Validation Secure Server CA |
2020-04-30 - 2020-07-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.pagamento-secure.com/Soft-App/fatturazione/
Frame ID: DAD915B89095C81789C5AB322F39D6DD
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.mines.gov.zw/modules/Log/
HTTP 301
https://www.pagamento-secure.com/Soft-App/ Page URL
- https://www.pagamento-secure.com/Soft-App/fatturazione/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.mines.gov.zw/modules/Log/
HTTP 301
https://www.pagamento-secure.com/Soft-App/ Page URL
- https://www.pagamento-secure.com/Soft-App/fatturazione/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.mines.gov.zw/modules/Log/ HTTP 301
- https://www.pagamento-secure.com/Soft-App/
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
www.pagamento-secure.com/Soft-App/ Redirect Chain
|
61 B 139 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
www.pagamento-secure.com/Soft-App/fatturazione/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-oui.css
www.pagamento-secure.com/Soft-App/fatturazione/ |
28 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
art.css
www.pagamento-secure.com/Soft-App/fatturazione/ |
16 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Browser.css
www.pagamento-secure.com/Soft-App/fatturazione/ |
3 KB 940 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BSEPAGAM.svg
www.pagamento-secure.com/Soft-App/fatturazione/ |
3 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
language_it.svg
www.pagamento-secure.com/Soft-App/fatturazione/ |
752 B 782 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico_arrowhead_progressBar_finished.svg
www.pagamento-secure.com/Soft-App/fatturazione/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico_arrowhead_progressBar_now.svg
www.pagamento-secure.com/Soft-App/fatturazione/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico_arrowhead_progressBar_next.svg
www.pagamento-secure.com/Soft-App/fatturazione/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
space.gif
www.pagamento-secure.com/Soft-App/fatturazione/ |
43 B 80 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico_arrowhead_main.svg
www.pagamento-secure.com/images/ |
12 KB 12 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico_arrowhead_back.svg
www.pagamento-secure.com/images/ |
12 KB 12 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banca Sella (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.mines.gov.zw
www.pagamento-secure.com
162.241.2.166
209.88.90.11
0906538538374c933f0afe4429f0339292af66ce2e8934cf7cde4ec701bda24d
377bbde16c41beb713154c2c290c5e4fad31dc9ecd5872ea863461143f1aa84b
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
55cc680096c147031170a3f5bc174ae7c721d8ec9c4a4495c1cff47ecd2fa9ab
72ff73ce57e732941a50dca7a5a73147ed36f13275c24fe8fb25493c4e663c85
78968380547ed62f00c1d115f573b73fd7c928bc3c418dbc2ea0934406edf912
80052e087c7689485037572a21818f76c1132d3f447b76e619a07bb6e77431d3
893899185a057e264b6b13635054edd3ae805c6abc2767a7ab79b361edc8f9c8
b7df3f607e2704502e16154beb52a35346a937ab5ccd276ccb288f0c5a7aad66
bccb23d41c2cc69cf0c7d22c4314ca8181a513c6999b73e45307792830f4e482
cd9d50c2ed2435774cb02b8f38f4292f40a3a54fb87a5a88b0819b6a1c1c6c32