standardbank.tunnelto.dev
Open in
urlscan Pro
2a09:8280:1:48de:ca2b:6d39:9790:f0da
Malicious Activity!
Public Scan
Effective URL: https://standardbank.tunnelto.dev/standardBank/standard/app/password.php
Submission: On February 09 via automatic, source certstream-suspicious — Scanned from NL
Summary
TLS certificate: Issued by R3 on January 20th 2024. Valid for: 3 months.
This is the only time standardbank.tunnelto.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Standard Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a02:4780:23:... 2a02:4780:23:7ad9:92d4:3c7a:32d2:3273 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 6 | 2a09:8280:1:4... 2a09:8280:1:48de:ca2b:6d39:9790:f0da | 40509 (FLY) (FLY) | |
5 | 1 |
ASN47583 (AS-HOSTINGER, CY)
www.standardbk.click |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
tunnelto.dev
1 redirects
standardbank.tunnelto.dev |
24 KB |
1 |
standardbk.click
1 redirects
www.standardbk.click |
362 B |
5 | 2 |
Domain | Requested by | |
---|---|---|
6 | standardbank.tunnelto.dev |
1 redirects
standardbank.tunnelto.dev
|
1 | www.standardbk.click | 1 redirects |
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.tunnelto.dev R3 |
2024-01-20 - 2024-04-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://standardbank.tunnelto.dev/standardBank/standard/app/password.php
Frame ID: B0EAA559E9C17448B41997F4EB8C50AB
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Sign inPage URL History Show full URLs
-
https://www.standardbk.click/
HTTP 302
https://standardbank.tunnelto.dev/standardBank/standard/ HTTP 302
https://standardbank.tunnelto.dev/standardBank/standard/app/password.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.standardbk.click/
HTTP 302
https://standardbank.tunnelto.dev/standardBank/standard/ HTTP 302
https://standardbank.tunnelto.dev/standardBank/standard/app/password.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
password.php
standardbank.tunnelto.dev/standardBank/standard/app/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bundle.css
standardbank.tunnelto.dev/standardBank/standard/libraries/css/ |
11 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionic.bundle.css
standardbank.tunnelto.dev/standardBank/standard/libraries/css/ |
19 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sbg.css
standardbank.tunnelto.dev/standardBank/standard/libraries/css/ |
26 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sbg.png
standardbank.tunnelto.dev/standardBank/standard/libraries/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Standard Bank (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
standardbank.tunnelto.dev/ | Name: PHPSESSID Value: r17nmdvh6o7h4ejb9ufc6jcra1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
standardbank.tunnelto.dev
www.standardbk.click
2a02:4780:23:7ad9:92d4:3c7a:32d2:3273
2a09:8280:1:48de:ca2b:6d39:9790:f0da
1a3aac076d48e18c6bd7547ca190a9b705f78d38cfc61e5a00f391b642c5adab
3789296a3c60f4cfa82fd3c139d1d7ef968a06a4bab871f679562121a5869b44
44d7c44d0c97501cae51f0cd180f75031463fcf366f0adb687808e2948ca8c9d
c38cb2bd5c5a1f6c04f18f487bc6f488454aa2668777ab0d9e515cfdac74b78b
de0155180c337684426db0246ce969f3ac30caf43499f932fe45e0b7ad003628