ebroubankinguyu.ebrouuyu.repl.co
Open in
urlscan Pro
35.186.245.55
Malicious Activity!
Public Scan
Submission: On August 06 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 5th 2022. Valid for: 3 months.
This is the only time ebroubankinguyu.ebrouuyu.repl.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de la República Oriental del Uruguay (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 35.186.245.55 35.186.245.55 | 15169 (GOOGLE) (GOOGLE) | |
13 | 1 |
ASN15169 (GOOGLE, US)
PTR: 55.245.186.35.bc.googleusercontent.com
ebroubankinguyu.ebrouuyu.repl.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
repl.co
ebroubankinguyu.ebrouuyu.repl.co |
779 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | ebroubankinguyu.ebrouuyu.repl.co |
ebroubankinguyu.ebrouuyu.repl.co
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ebrouuyu.repl.co R3 |
2022-08-05 - 2022-11-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ebroubankinguyu.ebrouuyu.repl.co/index1.html
Frame ID: DB78600B861E3619A8B194E2929E781C
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index1.html
ebroubankinguyu.ebrouuyu.repl.co/ |
25 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.css
ebroubankinguyu.ebrouuyu.repl.co/flfs/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionicons.css
ebroubankinguyu.ebrouuyu.repl.co/flfs/ |
59 KB 59 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.d18bb301.chunk.css
ebroubankinguyu.ebrouuyu.repl.co/flfs/ |
34 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.8d29879f.chunk.css
ebroubankinguyu.ebrouuyu.repl.co/flfs/ |
528 KB 529 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
slider-01.jpg
ebroubankinguyu.ebrouuyu.repl.co/flfs/ |
130 KB 130 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
selectArrowDown.b3a49a7d.svg
ebroubankinguyu.ebrouuyu.repl.co/frontend/static/media/ |
583 B 583 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GothamBook.woff2
ebroubankinguyu.ebrouuyu.repl.co/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Gotham-Medium.woff2
ebroubankinguyu.ebrouuyu.repl.co/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Gotham-Medium.woff
ebroubankinguyu.ebrouuyu.repl.co/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GothamBook.woff
ebroubankinguyu.ebrouuyu.repl.co/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Gotham-Medium.ttf
ebroubankinguyu.ebrouuyu.repl.co/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GothamBook.ttf
ebroubankinguyu.ebrouuyu.repl.co/flfs/gotham/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de la República Oriental del Uruguay (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ebroubankinguyu.ebrouuyu.repl.co
35.186.245.55
0d10a0bbf6ed1bff242da6db52a5d7cf3776a3585c11fe0390aa30641ac6065c
24a91b11b5f18ffcc8d6d6f3707bb263261de6eb7b4867cda0fdb116ced45efa
367cba5c66dcb77e9efdefae321a5fa51b4ed0773b15ebbd7a8ee35b913e75fe
62ebac9119c82db12553de55773d265db5cc81db125dda0e84443a59f7f9c369
970a245e193b5fcb6fb9e0fa1ecc9a8ee55f3775aa766fcea860ea2d9af9741f
9afde12f75dafba0637d0c7894c3d2426c102ab9f4fd8f330f076c4326a1b0a5
d4d41483cf38b6182b0a495196cfc55821cfd2e3d310861f32bcd2240806f187