borgerapp.com
Open in
urlscan Pro
92.205.14.36
Malicious Activity!
Public Scan
Submission: On October 07 via manual from DK — Scanned from DK
Summary
TLS certificate: Issued by borgerapp.com on October 6th 2022. Valid for: a year.
This is the only time borgerapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MitID (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 92.205.14.36 92.205.14.36 | 21499 (GODADDY-SXB) (GODADDY-SXB) | |
6 | 1 |
ASN21499 (GODADDY-SXB, DE)
PTR: 36.14.205.92.host.secureserver.net
borgerapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
borgerapp.com
borgerapp.com |
37 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | borgerapp.com |
borgerapp.com
|
6 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.mitid.dk |
Subject Issuer | Validity | Valid | |
---|---|---|---|
borgerapp.com borgerapp.com |
2022-10-06 - 2023-10-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://borgerapp.com/1066011987/login.php
Frame ID: F6242ACF3875B4CCC57ADF6428B05741
Requests: 6 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
borgerapp.com/1066011987/ |
1 KB 722 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
header_bar.png
borgerapp.com/props/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
brugerid5.png
borgerapp.com/props/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
submit.png
borgerapp.com/props/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glemtbruger1.png
borgerapp.com/props/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login_form.png
borgerapp.com/props/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MitID (Government)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
borgerapp.com/ | Name: PHPSESSID Value: d33036bd286c9c4903e592c20bece058 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
borgerapp.com
92.205.14.36
16e7aeb6ca721ef19c806d5176d4c93d4baaf27011f677579d211f55dd0fd0bf
3ba7233c426e66dfa9e126acc48025adb5c13030a5cc07005075566ac793ce90
57d626dd85a54b59c269dcb13c2d40f529285667408953a954af5673e9b4c746
b5ce5fa34a8cf562e9e39f2c7b2a0e424c4c35664085b348f936a91962f30607
d68a8be885ca3f4ee1df6b7195baf3bd44955efbaebb62afbeb99b8d5a5acf4a
e3f251fc59b6c8a371e0a5e7174a6e16991dcc41ae92c8e8c625caea8dd51d81