dbs.comm.sg.viral221.com Open in urlscan Pro
204.11.59.118  Malicious Activity! Public Scan

URL: http://dbs.comm.sg.viral221.com/
Submission: On June 12 via manual from IN — Scanned from SG

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 204.11.59.118, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is dbs.comm.sg.viral221.com.
This is the only time dbs.comm.sg.viral221.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DBS Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 204.11.59.118 46606 (UNIFIEDLA...)
1 2
Apex Domain
Subdomains
Transfer
1 viral221.com
dbs.comm.sg.viral221.com
4 MB
1 1
Domain Requested by
1 dbs.comm.sg.viral221.com
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 2 frames:

Primary Page: http://dbs.comm.sg.viral221.com/
Frame ID: 7B812D638CBAD59BE76DFF173B96E255
Requests: 4 HTTP requests in this frame

Frame: data://truncated
Frame ID: 673980966F27A69C511E7A385BBFBFB9
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

DBS iBanking

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

4528 kB
Transfer

8287 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
dbs.comm.sg.viral221.com/
6 MB
4 MB
Document
General
Full URL
http://dbs.comm.sg.viral221.com/
Protocol
HTTP/1.1
Server
204.11.59.118 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
204-11-59-118.unifiedlayer.com
Software
Apache /
Resource Hash
86e5ad280a00355550a73502dc92d7cb3dccfb85453c9d3b6e44ffa0b5894d58

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36
accept-language
zh-SG,zh;q=0.9

Response headers

Connection
Upgrade, Keep-Alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Mon, 12 Jun 2023 03:45:12 GMT
Keep-Alive
timeout=5, max=75
Server
Apache
Transfer-Encoding
chunked
Upgrade
h2,h2c
Vary
Accept-Encoding
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8fde3b7e7614c23b342d70797d7c1597b6955639d3422040d800051101c842fb

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
http://dbs.comm.sg.viral221.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/webp
truncated
/
22 KB
22 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f7c80617b6d6d6f26a92d758c0dce67b8513c67c40cd18e3936c8b7d6c2afbbb

Request headers

Referer
http://dbs.comm.sg.viral221.com/
Origin
http://dbs.comm.sg.viral221.com
accept-language
zh-SG,zh;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
font/woff
truncated
/
25 KB
25 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b60923b5232af55ca5a0e74c9488e47b421b884e1b41c79e010c104078ca8f1d

Request headers

Referer
http://dbs.comm.sg.viral221.com/
Origin
http://dbs.comm.sg.viral221.com
accept-language
zh-SG,zh;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/ Frame 6739
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60df6e79689a538bc91389373cb9b938f63f4687bb445fe21c6255a8b98ca05c

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 6739
688 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6b2e265b44eecef959a7d22471d0e6e3d391185b07c95ecfdc2cb311715db15f

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 6739
2 MB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
aab199d7c407efc65eb067964187dc9fc6b1a723b0df18c43dc595242ea22f34

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/ Frame 6739
2 KB
2 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1f5244c71b03253ff5e2a4da21f13a016b0456825d5399ba583768bd12692c95

Request headers

Referer
Origin
null
accept-language
zh-SG,zh;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
font/woff

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DBS Bank (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend function| chk

0 Cookies