web6054.cweb04.gamingweb.de
Open in
urlscan Pro
45.81.232.17
Malicious Activity!
Public Scan
Effective URL: https://web6054.cweb04.gamingweb.de/bevestigen/
Submission: On June 09 via automatic, source openphish
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 9th 2020. Valid for: 3 months.
This is the only time web6054.cweb04.gamingweb.de was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 116.211.169.137 116.211.169.137 | 58563 (CHINATELE...) (CHINATELECOM-HUBEI-IDC CHINANET Hubei province network) | |
1 1 | 2606:4700:303... 2606:4700:3031::681f:4887 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 45.81.232.17 45.81.232.17 | 44066 (DE-FIRSTC...) (DE-FIRSTCOLO www.first-colo.net) | |
12 | 1 |
ASN58563 (CHINATELECOM-HUBEI-IDC CHINANET Hubei province network, CN)
t.cn |
ASN44066 (DE-FIRSTCOLO www.first-colo.net, DE)
PTR: 45.81.232.17.mc-host24.de
web6054.cweb04.gamingweb.de |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
gamingweb.de
web6054.cweb04.gamingweb.de |
238 KB |
1 |
xip.li
1 redirects
xip.li |
957 B |
1 |
t.cn
1 redirects
t.cn |
267 B |
12 | 3 |
Domain | Requested by | |
---|---|---|
12 | web6054.cweb04.gamingweb.de |
web6054.cweb04.gamingweb.de
|
1 | xip.li | 1 redirects |
1 | t.cn | 1 redirects |
12 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
inlogcodes.mijn.ing.nl |
aanvragen.ing.nl |
www.ing.nl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
web6054.cweb04.gamingweb.de Let's Encrypt Authority X3 |
2020-06-09 - 2020-09-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://web6054.cweb04.gamingweb.de/bevestigen/
Frame ID: 80F6F555878832F9DBD78EE41F58AEDA
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://t.cn/A62gq9DZ
HTTP 302
https://xip.li/5TUGj9 HTTP 302
https://web6054.cweb04.gamingweb.de/bevestigen/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Gebruikersnaam of wachtwoord vergeten?
Search URL Search Domain Scan URL
Title: Mijn ING aanvragen
Search URL Search Domain Scan URL
Title: Contact met ING
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://t.cn/A62gq9DZ
HTTP 302
https://xip.li/5TUGj9 HTTP 302
https://web6054.cweb04.gamingweb.de/bevestigen/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
web6054.cweb04.gamingweb.de/bevestigen/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jsq.js
web6054.cweb04.gamingweb.de/bevestigen/ |
111 KB 112 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ing-logo.svg
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
11 KB 12 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alert-error.svg
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
623 B 796 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkbox.svg
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
281 B 454 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-chevron-open-right.svg
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
366 B 539 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
menu-close.svg
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
348 B 521 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
illustratie_algemenestoring.png
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base.css
web6054.cweb04.gamingweb.de/bevestigen/ |
15 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
811383197.svg
web6054.cweb04.gamingweb.de/bevestigen/css/img/ |
21 KB 21 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1224525800.woff2
web6054.cweb04.gamingweb.de/bevestigen/css/fonts/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_388920554.woff2
web6054.cweb04.gamingweb.de/bevestigen/css/fonts/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
t.cn
web6054.cweb04.gamingweb.de
xip.li
116.211.169.137
2606:4700:3031::681f:4887
45.81.232.17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