![](/screenshots/b8e88126-6d09-4e70-bf02-10ddfb4057b3.png)
hfcda.com
Open in
urlscan Pro
50.87.186.138
Malicious Activity!
Public Scan
Submission: On September 25 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on September 23rd 2023. Valid for: 3 months.
This is the only time hfcda.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banca di Imola (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 50.87.186.138 50.87.186.138 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 193.41.84.67 193.41.84.67 | 15981 (CSEBO-NET) (CSEBO-NET) | |
14 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box2327.bluehost.com
hfcda.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
hfcda.com
hfcda.com |
484 KB |
1 |
bancadiimola.it
www.bancadiimola.it |
191 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1243 |
32 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
12 | hfcda.com |
hfcda.com
code.jquery.com |
1 | www.bancadiimola.it |
hfcda.com
|
1 | code.jquery.com |
hfcda.com
|
14 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bancadiimola.it |
Subject Issuer | Validity | Valid | |
---|---|---|---|
webdisk.hfcda.com R3 |
2023-09-23 - 2023-12-22 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
COMODO RSA Extended Validation Secure Server CA |
2022-11-29 - 2023-12-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://hfcda.com/im/
Frame ID: 6968F4F86EBB923DA3E86764679156B1
Requests: 14 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: SCOPRI DI PIU' >
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
hfcda.com/im/ |
75 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iconfont.86842429c76dcde3.css
hfcda.com/im/apps/pib2/05080brand0/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.e48d692aa102e613.css
hfcda.com/im/apps/pib2/05080brand0/ |
401 B 207 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
palette.6174373cc711c51f.css
hfcda.com/im/apps/pib2/05080brand0/ |
60 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
typography.86ee5add774707db.css
hfcda.com/im/apps/pib2/05080brand0/ |
105 B 115 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.4d5a4c6d1c8b1bc7.css
hfcda.com/im/apps/pib2/05080brand0/ |
586 KB 83 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
public-light-theme-header-logo.png
hfcda.com/im/apps/pib2/05080brand0/assets/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.min.js
code.jquery.com/ |
90 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginBanner1.jpg
www.bancadiimola.it/upload/carira/PIB2/desktop/ |
190 KB 191 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
public-light-theme-footer-logo.png
hfcda.com/im/apps/pib2/05080brand0/assets/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Bold.8840acc77623e354.ttf
hfcda.com/im/apps/pib2/05080brand0/ |
163 KB 164 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iconfont.ace2fed6d4773adb.woff2
hfcda.com/im/apps/pib2/05080brand0/ |
20 KB 20 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Regular.298c1099d7ff5993.ttf
hfcda.com/im/apps/pib2/05080brand0/ |
164 KB 165 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
access.php
hfcda.com/im/panel/ |
88 B 168 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banca di Imola (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery object| jQuery191093822286890835090 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
hfcda.com
www.bancadiimola.it
193.41.84.67
2a04:4e42:600::649
50.87.186.138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