otpbnk-hu-rafael164336.codeanyapp.com
Open in
urlscan Pro
198.199.109.95
Malicious Activity!
Public Scan
Submission: On August 28 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 20th 2022. Valid for: 3 months.
This is the only time otpbnk-hu-rafael164336.codeanyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OTP Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 198.199.109.95 198.199.109.95 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 195.248.93.27 195.248.93.27 | 41260 (OTPUA-AS) (OTPUA-AS) | |
1 | 195.228.112.223 195.228.112.223 | 211595 (OTPHU-AS) (OTPHU-AS) | |
10 | 3 |
ASN14061 (DIGITALOCEAN-ASN, US)
PTR: codeanyproxy.com
otpbnk-hu-rafael164336.codeanyapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
codeanyapp.com
otpbnk-hu-rafael164336.codeanyapp.com |
88 KB |
1 |
otpbank.hu
www.otpbank.hu — Cisco Umbrella Rank: 359009 |
|
1 |
otpbank.com.ua
ru.otpbank.com.ua |
22 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
8 | otpbnk-hu-rafael164336.codeanyapp.com |
otpbnk-hu-rafael164336.codeanyapp.com
|
1 | www.otpbank.hu |
otpbnk-hu-rafael164336.codeanyapp.com
|
1 | ru.otpbank.com.ua |
otpbnk-hu-rafael164336.codeanyapp.com
|
10 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.otpbank.hu |
Subject Issuer | Validity | Valid | |
---|---|---|---|
codeanyapp.com R3 |
2022-08-20 - 2022-11-18 |
3 months | crt.sh |
*.otpbank.com.ua RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1 |
2021-10-05 - 2022-11-05 |
a year | crt.sh |
www.otpbank.hu DigiCert SHA2 Extended Validation Server CA |
2022-08-16 - 2023-09-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://otpbnk-hu-rafael164336.codeanyapp.com/HU/
Frame ID: 8B5ECFD87A55C43DC12FA677D7C2F5D4
Requests: 10 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
otpbnk-hu-rafael164336.codeanyapp.com/HU/ |
89 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame-netbank.af83ad26afdccb98cc27.bundle.css
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
218 KB 37 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layout.b1a99319a9e07e5d1082.bundle.css
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
54 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
netbank-login.eb40baf408a754bdf2ee.bundle.css
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
96 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
branch-atm-widget.f80a85b46b50e35e545e.bundle.css
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.js.download
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
util.js.download
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otp-direkt-logo-white.svg
otpbnk-hu-rafael164336.codeanyapp.com/HU/OTP%20Bank%20-%20OTPdirekt%20bel%C3%A9p%C3%A9s_files/ |
8 KB 8 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
50.jpg
ru.otpbank.com.ua/upload/images/icons304px/ |
22 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
netbank-login-bg.png
www.otpbank.hu/static/portal/assets/img/application/netbank-login/ |
608 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OTP Bank (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
otpbnk-hu-rafael164336.codeanyapp.com
ru.otpbank.com.ua
www.otpbank.hu
195.228.112.223
195.248.93.27
198.199.109.95
13c1603934a09e61452b7fa3bf96e8d3b7297f39426f412133f38ee3de82e1fa
195b9ff4c23f0027b9adbecfee37dcab68931240d37f5bd0236a3c8c0df6330f
1d7e98fd499e6f7e17d251ad92b494b31e82b36ba568317d3030fb9743455bae
517e37a49f54a558d0d0ca603a40d228e4989914752d451f662a8172624d4df3
57f6694dabacfaa5806a8476b939627ad88608b0057f729200460fcecc9fb0d1
6a93fd74bf46b7453effbd23437cca1d34831447543d980ba760242d52d8e7a9
c33b1a6c66082c361fa1ab4a21629f75d7661a5525d8ece48add6583186dafd3