www.nineled.com
Open in
urlscan Pro
2606:4700:3032::6818:7fdc
Malicious Activity!
Public Scan
Submission Tags: @jcybersec_
Submission: On June 12 via api from GB
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on May 26th 2020. Valid for: a year.
This is the only time www.nineled.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tesco Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 2606:4700:303... 2606:4700:3032::6818:7fdc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
20 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
nineled.com
www.nineled.com |
279 KB |
0 |
tescobank.com
Failed
www.tescobank.com Failed |
|
20 | 2 |
Domain | Requested by | |
---|---|---|
16 | www.nineled.com |
www.nineled.com
|
0 | www.tescobank.com Failed |
www.nineled.com
|
20 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.tescobank.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-05-26 - 2021-05-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.nineled.com/tesc00line.updatemessages1/auth/login.php?action=Login&account=z9ss0j8JQ4xUQ84yYgayBPsfO
Frame ID: 3F5C7F0E30FE4A8659DAEAE9C9DBED14
Requests: 21 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: Cookie Policy
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title: Online Banking system requirements
Search URL Search Domain Scan URL
Title: Forgotten your username?
Search URL Search Domain Scan URL
Title: Remember my username help
Search URL Search Domain Scan URL
Title: Online banking help
Search URL Search Domain Scan URL
Title: How to protect yourself online
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
www.nineled.com/tesc00line.updatemessages1/auth/ |
15 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
enc.js
www.nineled.com/tesc00line.updatemessages1/auth/assets/js/ |
8 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.min.css
www.nineled.com/tesc00line.updatemessages1/auth/assets/css/ |
16 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login-head.js
www.nineled.com/tesc00line.updatemessages1/auth/assets/js/ |
5 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Bootstrap.js
www.nineled.com/tesc00line.updatemessages1/auth/assets/js/ |
0 133 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smart-app-banner.css
www.nineled.com/tesc00line.updatemessages1/auth/assets/css/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.min.js
www.nineled.com/tesc00line.updatemessages1/auth/assets/js/ |
102 KB 34 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smart-app-banner.js
www.nineled.com/tesc00line.updatemessages1/auth/assets/js/ |
6 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
security-24.png
www.nineled.com/tesc00line.updatemessages1/auth/assets/img/ |
474 B 619 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nbl-bank@1600px.jpg
www.nineled.com/tesc00line.updatemessages1/auth/assets/img/ |
116 KB 117 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
roboto-light.woff
www.tescobank.com/assets/website/fonts/Roboto-Light/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tooltip-24.png
www.nineled.com/tesc00line.updatemessages1/auth/assets/img/ |
901 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
432 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
roboto-medium.woff
www.tescobank.com/assets/website/fonts/Roboto-Medium/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
tescorg.woff
www.tescobank.com/assets/website/fonts/Tesco/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
tescobd.woff
www.tescobank.com/assets/website/fonts/Tesco/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
close.png
www.nineled.com/tesc00line.updatemessages1/auth/assets/img/ |
474 B 662 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tescobd.ttf
www.nineled.com/tesc00line.updatemessages1/auth/assets/fonts/ |
59 KB 28 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-light.ttf
www.nineled.com/tesc00line.updatemessages1/auth/assets/fonts/ |
45 KB 23 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tescorg.ttf
www.nineled.com/tesc00line.updatemessages1/auth/assets/fonts/ |
63 KB 28 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
roboto-medium.ttf
www.nineled.com/tesc00line.updatemessages1/auth/assets/fonts/ |
44 KB 24 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.tescobank.com
- URL
- https://www.tescobank.com/assets/website/fonts/Roboto-Light/roboto-light.woff
- Domain
- www.tescobank.com
- URL
- https://www.tescobank.com/assets/website/fonts/Roboto-Medium/roboto-medium.woff
- Domain
- www.tescobank.com
- URL
- https://www.tescobank.com/assets/website/fonts/Tesco/tescorg.woff
- Domain
- www.tescobank.com
- URL
- https://www.tescobank.com/assets/website/fonts/Tesco/tescobd.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tesco Bank (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt object| Modernizr function| $ function| jQuery object| TB1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.nineled.com/ | Name: __cfduid Value: de0b46b404486718ec95c1827ab85be931591966757 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.nineled.com
www.tescobank.com
www.tescobank.com
2606:4700:3032::6818:7fdc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