verfahren-sp.net
Open in
urlscan Pro
2606:4700:3033::ac43:d9e7
Malicious Activity!
Public Scan
Effective URL: https://verfahren-sp.net/SPPRTZLKDJ/index.php?FGDD=1
Submission Tags: threatview.io malwar3ninja rule: suspected phishing scam automated-submission Search All
Submission: On August 14 via api from DE — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 9th 2024. Valid for: 3 months.
This is the only time verfahren-sp.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 18 | 2606:4700:303... 2606:4700:3033::ac43:d9e7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 76.76.21.98 76.76.21.98 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 2606:4700:303... 2606:4700:3033::6815:1d6b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
19 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
verfahren-sp.net
2 redirects
verfahren-sp.net |
675 KB |
2 |
umami.dev
api-gateway.umami.dev — Cisco Umbrella Rank: 88435 |
753 B |
1 |
umami.is
analytics.eu.umami.is |
2 KB |
19 | 3 |
Domain | Requested by | |
---|---|---|
18 | verfahren-sp.net |
2 redirects
verfahren-sp.net
|
2 | api-gateway.umami.dev |
analytics.eu.umami.is
|
1 | analytics.eu.umami.is |
verfahren-sp.net
|
19 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
verfahren-sp.net WE1 |
2024-08-09 - 2024-11-07 |
3 months | crt.sh |
analytics.eu.umami.is R10 |
2024-07-29 - 2024-10-27 |
3 months | crt.sh |
umami.dev E6 |
2024-06-25 - 2024-09-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://verfahren-sp.net/SPPRTZLKDJ/index.php?FGDD=1
Frame ID: 03F2AEA94E0E1CA51D1122E9314B33B4
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
Online-Banking Zugang aktivieren | SparkassePage URL History Show full URLs
-
http://verfahren-sp.net/
HTTP 307
https://verfahren-sp.net/ Page URL
-
https://verfahren-sp.net/cdn-cgi/phish-bypass?atok=OoS6Lz.uIlVzOinNHP4ZA0URzzTgHseS1voDJfoqRBo-172362...
HTTP 301
https://verfahren-sp.net/ HTTP 302
https://verfahren-sp.net/SPPRTZLKDJ/index.php?FGDD=1 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://verfahren-sp.net/
HTTP 307
https://verfahren-sp.net/ Page URL
-
https://verfahren-sp.net/cdn-cgi/phish-bypass?atok=OoS6Lz.uIlVzOinNHP4ZA0URzzTgHseS1voDJfoqRBo-1723626848-0.0.1.1-%2F
HTTP 301
https://verfahren-sp.net/ HTTP 302
https://verfahren-sp.net/SPPRTZLKDJ/index.php?FGDD=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://verfahren-sp.net/ HTTP 307
- https://verfahren-sp.net/
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
verfahren-sp.net/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
verfahren-sp.net/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
verfahren-sp.net/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
verfahren-sp.net/ |
278 B 663 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
index.php
verfahren-sp.net/SPPRTZLKDJ/ Redirect Chain
|
144 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
analytics.eu.umami.is/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
internetfiliale.min.afc7ae1f00ee4bfb9d51522c08de507e.css
verfahren-sp.net/SPPRTZLKDJ/X911/ |
2 MB 330 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
internetfiliale.min.1ad45579c103c7d4ed66d462b867cc32.js
verfahren-sp.net/SPPRTZLKDJ/X911/ |
679 KB 203 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
zab.jpg
verfahren-sp.net/SPPRTZLKDJ/X911/ |
19 KB 20 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1828945.png
verfahren-sp.net/SPPRTZLKDJ/X911/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
512x512bb.jpg
verfahren-sp.net/SPPRTZLKDJ/X911/ |
14 KB 15 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Bd.woff
verfahren-sp.net/SPPRTZLKDJ/X911/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Rg.woff
verfahren-sp.net/SPPRTZLKDJ/X911/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
break.html
verfahren-sp.net/content/myif/sk-koblenz/work/filiale/de/home/misc/ |
278 B 629 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
send
api-gateway.umami.dev/api/ |
56 B 753 B |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
send
api-gateway.umami.dev/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.php
verfahren-sp.net/SPPRTZLKDJ/ |
144 KB 10 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
verfahren-sp.net/SPPRTZLKDJ/X911/ |
1 KB 703 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.php
verfahren-sp.net/SPPRTZLKDJ/ |
144 KB 10 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)45 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| umami function| _0x37ad function| _0x2c36 object| IF6 function| getQueryParamValue function| overlayShow function| overlayClose function| setSessionTimeout function| focusBankingFormularElement function| toggleClassInRows function| SLURI function| moveBContent object| ifLoginHeaderTimer function| refreshClientTimeout function| refreshServerTimeout function| showCountdownLayer function| updateHeaderLoginIfPresent function| tick function| countdownShow function| callBreakHtml object| nbfDatePicker object| nbfTanInput function| selectListBoxItem function| createMobileViewContainer function| destroyMobileViewContainer function| initializeMobileViewContainer function| clickHandlerClose function| editTeaserRef function| pagenav_statistics_send function| pagenav_statistics function| pagenav_scroll function| pagenav_scroll_window function| $ function| jQuery object| myif function| filterOptions function| clearInput function| normalizeText function| selectOption function| redirect number| chr boolean| bcarouselAttached object| $mkpDropzoneInput object| $mkpDropzone boolean| mkp_switcher2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.verfahren-sp.net/ | Name: __cf_mw_byp Value: OoS6Lz.uIlVzOinNHP4ZA0URzzTgHseS1voDJfoqRBo-1723626848-0.0.1.1-/ |
|
verfahren-sp.net/ | Name: PHPSESSID Value: klfdseg1ht0hquvl0gegks6pi4 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
analytics.eu.umami.is
api-gateway.umami.dev
verfahren-sp.net
2606:4700:3033::6815:1d6b
2606:4700:3033::ac43:d9e7
76.76.21.98
1bf2bea2f3e0af55f365697cfc2a0b37e8d76a075cb53459521e0237d85e4eab
2b09bfaae201b4b85471fc79e4890ed850374b3751f3dbda255092b1740c4737
2b8fde28dd4cad00183eb38e130e31e1f8026f8a4b27a8a8a39256e5a249e790
3317187f76e36dc3a4e97ff04eca2ab5bffe35684422e4d64fe1f3fed8694d2b
43a2c75ca73d8c1101ff7ae617e6dbc6934e8aa1cd72d64ce50908ac297156cb
6cfeb46db3598e7ff3c248126fe9d544fe1e00f4ab311dec3cafe0bbefc0fde3
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
9ae3f33664fc3b273913900b81d8812d5a6a3c098b86d93d1f0ec54259d9441d
a0fb795ae3d496acccf0fc6815b2dc24ac40b3cd6398e880a5d3cec6e9244011
b388bdc8e4579bc1bdc7740215c3f426e8f419c5bf2d95085c0a3bc0ad92fdd3
b9f51ffb781c1c87bc269d4afa597557c94a3fea65c2fac4da5c05cbb6d5b40b
d778f9a248709d6508a3728820131d0fca71ba5d025f231d63dc16064f3bde02
ddfabcc95f5c431087bb7a466660546c05073b7e1019e2498dbb7e53cce2b50b
efea87cb00bae1bd1334d1b15d66a007d38b94b4bf4e15bc0e37a7814a4276df
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016