aplanalyst.com
Open in
urlscan Pro
104.238.103.172
Malicious Activity!
Public Scan
Effective URL: https://aplanalyst.com/T-online/index.php?email=
Submission: On December 16 via automatic, source phishtank
Summary
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on October 24th 2017. Valid for: 3 years.
This is the only time aplanalyst.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telekom (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 104.238.103.172 104.238.103.172 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
10 | 2003:2:2:140:... 2003:2:2:140:62:157:140:200 | 3320 (DTAG Inte...) (DTAG Internet service provider operations) | |
11 | 2 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-104-238-103-172.ip.secureserver.net
aplanalyst.com |
ASN3320 (DTAG Internet service provider operations, DE)
accounts.login.idm.telekom.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
telekom.com
accounts.login.idm.telekom.com |
246 KB |
2 |
aplanalyst.com
1 redirects
aplanalyst.com |
283 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | accounts.login.idm.telekom.com |
aplanalyst.com
accounts.login.idm.telekom.com |
2 | aplanalyst.com | 1 redirects |
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
meinkonto.telekom-dienste.de |
www.telekom.de |
www.telekom.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
aplanalyst.com COMODO RSA Domain Validation Secure Server CA |
2017-10-24 - 2020-10-23 |
3 years | crt.sh |
accounts.login.idm.telekom.com Symantec Class 3 Extended Validation SHA256 SSL CA |
2017-05-10 - 2019-06-15 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://aplanalyst.com/T-online/index.php?email=
Frame ID: (647560E208DDFD66258F60DF9432DABE)
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://aplanalyst.com/T-online/index.php?email=
HTTP 302
https://aplanalyst.com/T-online/index.php?email= Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Passwort vergessen?
Search URL Search Domain Scan URL
Title: Jetzt registrieren
Search URL Search Domain Scan URL
Title: Impressum
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://aplanalyst.com/T-online/index.php?email=
HTTP 302
https://aplanalyst.com/T-online/index.php?email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
aplanalyst.com/T-online/ Redirect Chain
|
9 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.min.css
accounts.login.idm.telekom.com/static/vdplus/css/ |
85 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
accounts.login.idm.telekom.com/static/factorx/vdplus/css/ |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.3.min.js
accounts.login.idm.telekom.com/static/vdplus/js/ |
94 KB 32 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.min.js
accounts.login.idm.telekom.com/static/vdplus/js/ |
66 KB 20 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
accounts.login.idm.telekom.com/static/factorx/vdplus/js/ |
7 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telekomicon-outline.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
9 KB 9 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-bold.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
53 KB 53 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-thin.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
57 KB 57 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-regular.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
54 KB 54 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telekomicon-ui.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
3 KB 3 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telekom (Telecommunication)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint function| disableselect function| reEnable boolean| accountLocked boolean| accountLockedPermanent number| accountLockExpiration function| $ function| jQuery object| Login object| jQuery1113081093376483266640 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
accounts.login.idm.telekom.com
aplanalyst.com
104.238.103.172
2003:2:2:140:62:157:140:200
21d4dc49ec496581969051f9f542afee01f9029e7db6112bff99e7be2942de53
345466d497966801ab4b5390c09e49d03f2ede8539bd35a56e25ed15bb2dc80e
43493c8fdfe7935a395920ef619a4dc56c440479ce190ad2ac1df8e23acc5595
5f7cfce6795fde3a6ac4f1a431666cdd77d3e8a7bc3bb2a35ff7a28aff9f5d30
d3f14d30fdf827b2b3fbbd044f6d6b9bf26751a457f2a68ef89308fdc2ac5b7b
d9e120fd2798b90e1a4aed8b465d891de4ee81ee43cfc6a417ad2015bd3c6be3
ddb8c6fcd97c6216f6293cea9de34f9730ffca03374de6dec4f89b6802cb0928
e185aceb03040c947c211bc9e972ce427f11c5801338fd8f943e3b53e229eb3e
e1b1f6b64573c86c3b9f5f023ab7e791a074dbccb87d61e886cb6fa659ba9485
e5a1bef74748388cadf99777549feff118627b888816a6f57fc0fb36e3cad57f
ecb916133a9376911f10bc5c659952eb0031e457f5df367cde560edbfba38fb8