www.central.gov.py
Open in
urlscan Pro
190.52.186.31
Malicious Activity!
Public Scan
Submission: On April 09 via automatic, source openphish
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 25th 2019. Valid for: 3 months.
This is the only time www.central.gov.py was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Itau (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 190.52.186.31 190.52.186.31 | 27866 (CO.PA.CO.) (CO.PA.CO.) | |
11 | 2 |
ASN27866 (CO.PA.CO., PY)
PTR: host-31.186.52.190.copaco.com.py
www.central.gov.py |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
central.gov.py
www.central.gov.py |
261 KB |
0 |
googleapis.com
Failed
ajax.googleapis.com Failed |
|
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | www.central.gov.py |
www.central.gov.py
|
0 | ajax.googleapis.com Failed |
www.central.gov.py
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.central.gov.py Let's Encrypt Authority X3 |
2019-07-25 - 2019-10-23 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/home.html
Frame ID: F70241D7550A1A97A9B3D7BA15281E8E
Requests: 1 HTTP requests in this frame
Frame:
https://www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/Inicial.php
Frame ID: E1B5146F4AD621A5664164A7D8AA157E
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
home.html
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/ |
738 B 989 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
Inicial.php
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/ Frame E1B5 |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
principal.css
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/Style/ Frame E1B5 |
986 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
function.js
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/ Frame E1B5 |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ag-conta-dropdown.png
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/pics/ Frame E1B5 |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Doodle.jpg
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/ Frame E1B5 |
231 KB 231 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Inicial.php
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/ Frame E1B5 |
2 KB 3 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.1/ Frame E1B5 |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fundo.png
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/pics/ Frame E1B5 |
189 B 424 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img1.png
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/pics/ Frame E1B5 |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fundobotao.png
www.central.gov.py/wp-content/themes/twentyseventeen/inc/painel/pics/ Frame E1B5 |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ajax.googleapis.com
- URL
- http://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Itau (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| titulo1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.central.gov.py/ | Name: PHPSESSID Value: 950hgq2tpn79ne8pp23i8esjg5 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
www.central.gov.py
ajax.googleapis.com
190.52.186.31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