manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com
Open in
urlscan Pro
198.199.109.95
Malicious Activity!
Public Scan
Effective URL: https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/signin.php
Submission: On August 03 via api from PL — Scanned from CH
Summary
TLS certificate: Issued by E5 on July 15th 2024. Valid for: 3 months.
This is the only time manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Schweizerische Bundesbahnen (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 192.250.229.92 192.250.229.92 | 209341 (WHG-FRA) (WHG-FRA) | |
2 | 52.239.221.36 52.239.221.36 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
3 9 | 198.199.109.95 198.199.109.95 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 18.157.148.72 18.157.148.72 | () () | |
11 | 4 |
ASN209341 (WHG-FRA, GB)
PTR: s3181.fra1.stableserver.net
www.childnepal.org |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
sslpostch.blob.core.windows.net |
ASN14061 (DIGITALOCEAN-ASN, US)
PTR: codeanyproxy.com
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
codeanyapp.com
3 redirects
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com |
181 KB |
2 |
windows.net
sslpostch.blob.core.windows.net |
2 KB |
2 |
childnepal.org
2 redirects
www.childnepal.org |
1 KB |
1 |
sbb.ch
cdn.app.sbb.ch Failed |
19 KB |
0 |
swisspass.ch
Failed
resources.swisspass.ch Failed |
|
11 | 5 |
Domain | Requested by | |
---|---|---|
9 | manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com |
3 redirects
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com
|
2 | sslpostch.blob.core.windows.net | |
2 | www.childnepal.org | 2 redirects |
1 | cdn.app.sbb.ch |
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com
|
0 | resources.swisspass.ch Failed |
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com
|
11 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blob.core.windows.net Microsoft RSA TLS CA 01 |
2023-09-27 - 2024-09-27 |
a year | crt.sh |
codeanyapp.com E5 |
2024-07-15 - 2024-10-13 |
3 months | crt.sh |
*.app.sbb.ch Amazon RSA 2048 M02 |
2024-07-16 - 2025-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/signin.php
Frame ID: 89DCD514E7F494F388E916DEFD605729
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
SwissPassPage URL History Show full URLs
-
https://www.childnepal.org/wp
HTTP 301
https://www.childnepal.org/wp/ HTTP 302
https://sslpostch.blob.core.windows.net/sbb/sbb-online.html Page URL
-
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage
HTTP 301
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/ HTTP 302
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/index.php?id=2afeb2e8744b4ac6a741b057b5b569242afeb2e8... HTTP 302
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/signin.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.childnepal.org/wp
HTTP 301
https://www.childnepal.org/wp/ HTTP 302
https://sslpostch.blob.core.windows.net/sbb/sbb-online.html Page URL
-
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage
HTTP 301
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/ HTTP 302
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/index.php?id=2afeb2e8744b4ac6a741b057b5b569242afeb2e8744b4ac6a741b057b5b56924&act=2afeb2e8744b4ac6a741b057b5b569242afeb2e8744b4ac6a741b057b5b56924 HTTP 302
https://manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/signin.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://www.childnepal.org/wp HTTP 301
- https://www.childnepal.org/wp/ HTTP 302
- https://sslpostch.blob.core.windows.net/sbb/sbb-online.html
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
sbb-online.html
sslpostch.blob.core.windows.net/sbb/ Redirect Chain
|
648 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
signin.php
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/ Redirect Chain
|
18 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
sslpostch.blob.core.windows.net/ |
226 B 485 B |
Other
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sso.min-20200819.css
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/Login%20_%20SwissPass_files/ |
180 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_text_de-20200819.svg
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/ |
137 KB 137 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-20200819.svg
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loader-20200819.png
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/Login%20_%20SwissPass_files/ |
272 B 418 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
login_bg.jpg
resources.swisspass.ch/content/dam/swisspass/co-branding/swiss_ch/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
SBBWeb-Light.woff2
cdn.app.sbb.ch/fonts/v1_6_subset/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icomoon.woff2
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/SPPFXpWGlxbN/Smanage/f/ |
7 KB 7 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SBBWeb-Light.woff
cdn.app.sbb.ch/fonts/v1_6_subset/ |
18 KB 19 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- resources.swisspass.ch
- URL
- https://resources.swisspass.ch/content/dam/swisspass/co-branding/swiss_ch/login_bg.jpg
- Domain
- cdn.app.sbb.ch
- URL
- https://cdn.app.sbb.ch/fonts/v1_6_subset/SBBWeb-Light.woff2
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Schweizerische Bundesbahnen (Transportation)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| validateForm1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com/ | Name: PHPSESSID Value: m48b5o1hplnn7gc82ovk477sgk |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.app.sbb.ch
manage-sbb-onlinepass-sparkbuss880332.codeanyapp.com
resources.swisspass.ch
sslpostch.blob.core.windows.net
www.childnepal.org
cdn.app.sbb.ch
resources.swisspass.ch
18.157.148.72
192.250.229.92
198.199.109.95
52.239.221.36
2ec440268944bf1318d5a03d4ffa70f96d8812557b512cd868d56b39e663dc33
78a4a776506b173ae79fd021d0e9003c7d653ca204ea1d69bea4d553f92f787d
9bdf00f749af3b92a65178975ebf27dfebe2aa3429efacdffc5ef847e28a5990
c337d42ed7979c6be0282900bd957dd9d112a430dc7761463d655eb8f0d9bc07
caac1ccfffb987ae3b944565c4c375e1a58beb676e4bf82cee59db79ff6a4faf
da86a8f910323e36049f6fee7c877d53f9f5020f2031efdfabaec371476e1b5a
deeee170c3759a6ed35c0c05c5b935d0e7638f1c0c5677166918ecff6edb1909
f766c7457c6ec463eaa85778aa47261344f1772e0b7cf1987ad212f889f472f5