dev-reac85.pantheonsite.io
Open in
urlscan Pro
2620:12a:8001::2
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On May 29 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by Sectigo RSA Organization Validation S... on July 14th 2022. Valid for: a year.
This is the only time dev-reac85.pantheonsite.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco BCR (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2620:12a:8001::2 2620:12a:8001::2 | 54113 (FASTLY) (FASTLY) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
9 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
pantheonsite.io
dev-reac85.pantheonsite.io |
475 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 696 |
29 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | dev-reac85.pantheonsite.io |
dev-reac85.pantheonsite.io
|
1 | code.jquery.com |
dev-reac85.pantheonsite.io
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pantheonsite.io Sectigo RSA Organization Validation Secure Server CA |
2022-07-14 - 2023-06-23 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://dev-reac85.pantheonsite.io/
Frame ID: A78F587CF05115589069E299A2BEBEE6
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
dev-reac85.pantheonsite.io/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.3.min.js
code.jquery.com/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l.svg
dev-reac85.pantheonsite.io/ |
9 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lnks1.svg
dev-reac85.pantheonsite.io/ |
6 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lnks2.svg
dev-reac85.pantheonsite.io/ |
20 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tp1.svg
dev-reac85.pantheonsite.io/ |
7 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b.png
dev-reac85.pantheonsite.io/ |
452 KB 452 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.svg
dev-reac85.pantheonsite.io/ |
16 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
din-regular.ttf
dev-reac85.pantheonsite.io/ |
3 KB 2 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco BCR (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery function| xbndtl0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=300 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
dev-reac85.pantheonsite.io
2001:4de0:ac18::1:a:2a
2620:12a:8001::2
2869d08a9c7fafa3f6f27e9e10a2abe181190d7d8cae2e6b4a4e24a3fc1f1dff
6b6de0d4db7876d1183a3edb47ebd3bbbf93f153f5de1ba6645049348628109a
837ee911760036547c13611a88a704fcd4174faed2f5f0797be5fff3bbddf6be
a028081701e0dd95a8a12ff2a2856587b084a8ebb11af6fe5c221f742eecac62
a5d9a7913167c3aeb87dfe49a000a3433c43a504c4d2f923b099cfbf817d55a3
b3ebaec3f7a83062b2cff9340e5699fb69aa7e566e6bf4f4d93e018fd241737a
b798b4574ea27b8680f2198cf54462aa537ec1829e8ac67e78f33f1d6c23e0d2
d71fab67120a9a6b2d6631f59b5376db122a898bb6123089e4d44ec21aeca4c3
fc2fc4ed2f3b1851ba85d1ea3573522f580de7802661201b056c466104a044cf