dkbronding.dns.army Open in urlscan Pro
135.148.113.163  Malicious Activity! Public Scan

Submitted URL: http://qsj.is-a-knight.org/
Effective URL: https://dkbronding.dns.army/oih/
Submission: On February 27 via automatic, source phishtank — Scanned from IS

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 135.148.113.163, located in United States and belongs to OVH, FR. The main domain is dkbronding.dns.army.
TLS certificate: Issued by R3 on February 23rd 2024. Valid for: 3 months.
This is the only time dkbronding.dns.army was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DKB (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 132.226.44.1 31898 (ORACLE-BM...)
1 2 135.148.113.163 16276 (OVH)
1 2
Apex Domain
Subdomains
Transfer
2 dns.army
dkbronding.dns.army
194 KB
1 is-a-knight.org
qsj.is-a-knight.org
154 B
1 2
Domain Requested by
2 dkbronding.dns.army 1 redirects
1 qsj.is-a-knight.org 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
dkbronding.dns.army
R3
2024-02-23 -
2024-05-23
3 months crt.sh

This page contains 1 frames:

Primary Page: https://dkbronding.dns.army/oih/
Frame ID: E75B324A17EE64F5D739EE7CF5B204E7
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

DKB - Deutsche Kreditbank AG - Internet Banking

Page URL History Show full URLs

  1. http://qsj.is-a-knight.org/ HTTP 302
    https://dkbronding.dns.army/oih HTTP 301
    https://dkbronding.dns.army/oih/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

221 kB
Transfer

802 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://qsj.is-a-knight.org/ HTTP 302
    https://dkbronding.dns.army/oih HTTP 301
    https://dkbronding.dns.army/oih/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
dkbronding.dns.army/oih/
Redirect Chain
  • http://qsj.is-a-knight.org/
  • https://dkbronding.dns.army/oih
  • https://dkbronding.dns.army/oih/
744 KB
194 KB
Document
General
Full URL
https://dkbronding.dns.army/oih/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
135.148.113.163 , United States, ASN16276 (OVH, FR),
Reverse DNS
ip163.ip-135-148-113.us
Software
nginx / PHP/7.4.33 PleskLin
Resource Hash
2902e0719666652d32ea1fcd977ca180db7297543a3fdf6d4385a8b5073778d2

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
accept-language
is-IS,is;q=0.9

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Tue, 27 Feb 2024 14:16:25 GMT
server
nginx
vary
Accept-Encoding
x-powered-by
PHP/7.4.33 PleskLin

Redirect headers

content-length
310
content-type
text/html; charset=iso-8859-1
date
Tue, 27 Feb 2024 14:16:25 GMT
location
https://dkbronding.dns.army/oih/
server
nginx
x-powered-by
PleskLin
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9cddd6352a3c455a6553ab2c7959827c2f89b1043c4e81e47b7631dcde06cf7f

Request headers

accept-language
is-IS,is;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775

Request headers

Referer
Origin
https://dkbronding.dns.army
accept-language
is-IS,is;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c

Request headers

Referer
Origin
https://dkbronding.dns.army
accept-language
is-IS,is;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
22 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04de149751276069b2c581032afc9c43bf176fe06868a1f2147f3935b8ad116b

Request headers

accept-language
is-IS,is;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3fadfc70661c394dc68865f28bc889aeff26b251c6994cafbecc2300168c09ad

Request headers

accept-language
is-IS,is;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc

Request headers

Referer
Origin
https://dkbronding.dns.army
accept-language
is-IS,is;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
font/woff2

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DKB (Banking)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader

0 Cookies