zap470410-1.plesk05.zap-webspace.com
Open in
urlscan Pro
134.255.217.76
Malicious Activity!
Public Scan
Effective URL: http://zap470410-1.plesk05.zap-webspace.com/UH202JUG/
Submission Tags: @ipnigh
Submission: On December 16 via api from GB
Summary
This is the only time zap470410-1.plesk05.zap-webspace.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2606:4700:30:... 2606:4700:30::6818:72f9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 54.165.42.51 54.165.42.51 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
12 | 134.255.217.76 134.255.217.76 | 197071 (ACTIVE-SE...) (ACTIVE-SERVERS active-servers.com) | |
12 | 1 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-165-42-51.compute-1.amazonaws.com
split.to |
ASN197071 (ACTIVE-SERVERS active-servers.com, DE)
PTR: plesk05.zap-webspace.com
zap470410-1.plesk05.zap-webspace.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
zap-webspace.com
zap470410-1.plesk05.zap-webspace.com |
239 KB |
2 |
um.lk
2 redirects
um.lk |
561 B |
1 |
split.to
1 redirects
split.to |
636 B |
12 | 3 |
Domain | Requested by | |
---|---|---|
12 | zap470410-1.plesk05.zap-webspace.com |
zap470410-1.plesk05.zap-webspace.com
|
2 | um.lk | 2 redirects |
1 | split.to | 1 redirects |
12 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
inlogcodes.mijn.ing.nl |
aanvragen.ing.nl |
www.ing.nl |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://zap470410-1.plesk05.zap-webspace.com/UH202JUG/
Frame ID: C5AD9C1F7EDBD9CB6BFD8C2E3658DFB1
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://um.lk/btm
HTTP 307
https://um.lk/btm HTTP 302
http://split.to/AdRbyjW HTTP 302
http://zap470410-1.plesk05.zap-webspace.com/UH202JUG/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Gebruikersnaam of wachtwoord vergeten?
Search URL Search Domain Scan URL
Title: Mijn ING aanvragen
Search URL Search Domain Scan URL
Title: Contact met ING
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://um.lk/btm
HTTP 307
https://um.lk/btm HTTP 302
http://split.to/AdRbyjW HTTP 302
http://zap470410-1.plesk05.zap-webspace.com/UH202JUG/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
zap470410-1.plesk05.zap-webspace.com/UH202JUG/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jsq.js
zap470410-1.plesk05.zap-webspace.com/UH202JUG/ |
111 KB 112 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ing-logo.svg
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
11 KB 12 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alert-error.svg
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
623 B 910 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkbox.svg
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
281 B 568 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-chevron-open-right.svg
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
366 B 653 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
menu-close.svg
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
348 B 635 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
illustratie_algemenestoring.png
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base.css
zap470410-1.plesk05.zap-webspace.com/UH202JUG/ |
15 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
811383197.svg
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/img/ |
21 KB 21 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1224525800.woff2
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/fonts/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_388920554.woff2
zap470410-1.plesk05.zap-webspace.com/UH202JUG/css/fonts/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
split.to
um.lk
zap470410-1.plesk05.zap-webspace.com
134.255.217.76
2606:4700:30::6818:72f9
54.165.42.51
1e932fd1c21334067f030f29d277be08c51604c49d3dffe1600b891fceae4e3f
3a135f82b209a59959b162a1fbc9b0b38856d1332af286f86046b06357b3811e
3e5c9215408174cff78c491ad0cd933f2cf7c21bdaf61d71abac85e49f901fd2
4022271930d079acbbf85b25ee337d77605cb3f55fc15eb14d0e3c3fefd1c99e
403237e689dc78baa222a8d6cb6e3455d49c6dcef78391657e52f4161ee3da36
71345e7c99ee0f1cadbc1d9c778e97195c6859d5ba04ef931f306b06aa2ba683
83fd226ddbc6ab7a502849918dc525f5cd4a2c3d63711ffe9c08570d535bead9
84a60ca3b0ec180e3295696847244027db35fc8bd6f3c4919efcb0bdfa01d87a
9030f83b22e9a96c2aafff1a3abfdd4ffd0cffa31e1748df717d84282fba82b5
c40c32284db736cf15432a4da1684b391bb82d244589b2001f83a4cbd8e984bb
e86ba4f8dd6a82f423fbc44a456b3849eab753d9cee1057159093b9005ecb711
f74c344733a85af20d2754b208f12309e2a30c591795d0881cb0ad94c4be6155