![](/screenshots/dd3b54d1-5093-42b1-a817-e95981193c17.png)
stylewithnina.com
Open in
urlscan Pro
191.238.33.50
Malicious Activity!
Public Scan
Submission Tags: 7391064
Submission: On December 20 via api from US — Scanned from IT
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on February 26th 2021. Valid for: a year.
This is the only time stylewithnina.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banca Sella (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 191.238.33.50 191.238.33.50 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 213.218.53.1 213.218.53.1 | 21451 (SELLA-AS) (SELLA-AS) | |
13 | 2 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
PTR: waws-prod-blu-017.cloudapp.net
stylewithnina.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
stylewithnina.com
stylewithnina.com |
33 KB |
1 |
sella.it
ecomm.sella.it |
307 B |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | stylewithnina.com |
stylewithnina.com
|
1 | ecomm.sella.it |
stylewithnina.com
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
stylewithnina.com Sectigo RSA Domain Validation Secure Server CA |
2021-02-26 - 2022-02-26 |
a year | crt.sh |
ecomm.sella.it DigiCert SHA2 Extended Validation Server CA |
2020-12-28 - 2022-01-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/
Frame ID: 07DF3E1409884DCB3D3B45E20F67F4AF
Requests: 13 HTTP requests in this frame
Screenshot
![](/screenshots/dd3b54d1-5093-42b1-a817-e95981193c17.png)
Page Title
Pagina di pagamento Carta di CreditoDetected technologies
Detected patterns
- /wp-(?:content|includes)/
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Detected patterns
- jquery-ui.*\.js
![](/vendor/wappa/icons/reCAPTCHA.png)
Detected patterns
- <div[^>]+class="g-recaptcha"
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/ |
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.css
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
28 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
osp.js
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
3 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dyf.css
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
16 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkBrowser.css
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LOGO_BSE_PAGAM.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
3 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
language_italian.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
752 B 1002 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrowhead_progressBar_finished.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrowhead_progressBar_now.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrowhead_progressBar_next.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/xt/css/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spacer.gif
ecomm.sella.it/pagam/images/pagam2002/ |
43 B 307 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrowhead_main.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/images/ |
103 B 103 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_arrowhead_back.svg
stylewithnina.com/wp-includes/theme-compat/customerarea-aruba/images/ |
103 B 103 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banca Sella (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| validateLuhnCode function| onCardNumberChange function| isCardHolderValid function| onCardHolderChange function| real_cardNumberChange function| checkFormSubmit0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ecomm.sella.it
stylewithnina.com
191.238.33.50
213.218.53.1
377bbde16c41beb713154c2c290c5e4fad31dc9ecd5872ea863461143f1aa84b
3e4f14e97b2e0b57670a79102e1ca94da829d4b02863a5c16c057a01acd81906
499c82ca6d88e978791ad761998f039d8132424d98ff78fb8bc47bb9b898e438
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
55cc680096c147031170a3f5bc174ae7c721d8ec9c4a4495c1cff47ecd2fa9ab
78968380547ed62f00c1d115f573b73fd7c928bc3c418dbc2ea0934406edf912
80052e087c7689485037572a21818f76c1132d3f447b76e619a07bb6e77431d3
8856562d4c4b65b80fbf92e28d4815af8b809c4c88b93cb24b9dda377d6955fc
893899185a057e264b6b13635054edd3ae805c6abc2767a7ab79b361edc8f9c8
90b2d35cd5e08370ed20db81197dd9da1a4dbb421f71293fd5733ea49eb7b3e1
b7df3f607e2704502e16154beb52a35346a937ab5ccd276ccb288f0c5a7aad66
cd9d50c2ed2435774cb02b8f38f4292f40a3a54fb87a5a88b0819b6a1c1c6c32