![](/screenshots/d445f66e-7f5e-4c94-ab6a-f13907ddc622.png)
net.protecaocgdptegestao.com
Open in
urlscan Pro
172.67.173.239
Malicious Activity!
Public Scan
Submission Tags: @phish_report
Submission: On May 25 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by GTS CA 1P5 on May 25th 2024. Valid for: 3 months.
This is the only time net.protecaocgdptegestao.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 172.67.173.239 172.67.173.239 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
protecaocgdptegestao.com
net.protecaocgdptegestao.com |
14 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
3 | net.protecaocgdptegestao.com |
net.protecaocgdptegestao.com
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
protecaocgdptegestao.com GTS CA 1P5 |
2024-05-25 - 2024-08-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://net.protecaocgdptegestao.com/login.php
Frame ID: 61760CECD5350468EDA72648781F3264
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
net.protecaocgdptegestao.com/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
download.png
net.protecaocgdptegestao.com/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
net.protecaocgdptegestao.com/ |
315 B 573 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
May 25th 2024, 9:31:16 pm
UTC —
From Portugal
Threats:
Phishing
Brands:
Caixa Geral de DepĆ³sitos
PT
Comment: Fake phishing domain, targets customers from Portuguese bank.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| preencher0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
net.protecaocgdptegestao.com
172.67.173.239
0a47eadf63e1779ab018834bcfc5c4b4e6a5c48ba3c96db981fe676f9da10407
0e55648c87b4651be32dab7dcdc70893b2c188ae1e74d5ec9239d412383641eb
c9e11bb43178e394d6161eb6f5d0df4704a811c6ce22cdf28b05c12a2bb191d9