otpinternet-login.xyz
Open in
urlscan Pro
2606:4700:3037::ac43:aeb8
Malicious Activity!
Public Scan
Effective URL: https://otpinternet-login.xyz/
Submission Tags: @phish_report
Submission: On January 15 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by GTS CA 1P5 on January 14th 2024. Valid for: 3 months.
This is the only time otpinternet-login.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 4 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:303... 2606:4700:3035::6815:503c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 2606:4700:303... 2606:4700:3037::ac43:aeb8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
6 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
otpinternet-login.xyz
1 redirects
otpinternet-login.xyz |
4 MB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
31 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
6 | otpinternet-login.xyz |
1 redirects
otpinternet-login.xyz
|
1 | code.jquery.com |
otpinternet-login.xyz
|
6 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
internetbank.otpbank.hu |
www.otpbank.hu |
play.google.com |
itunes.apple.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
otpinternet-login.xyz GTS CA 1P5 |
2024-01-14 - 2024-04-13 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://otpinternet-login.xyz/
Frame ID: 470358B2198F7799300BE4D1366FD157
Requests: 21 HTTP requests in this frame
Frame:
data://truncated
Frame ID: 4BCAB672213859E47E39D0B4E46AB929
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Új internet- és mobilbank – OTP BankPage URL History Show full URLs
-
http://otpinternet-login.xyz/
HTTP 301
https://otpinternet-login.xyz/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
9 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: OTPdirekt internetbank
Search URL Search Domain Scan URL
Title: Elfelejtettem a jelszavam
Search URL Search Domain Scan URL
Title: Regisztrálok az új OTP InternetBankba
Search URL Search Domain Scan URL
Title: Get it on: Google Play
Search URL Search Domain Scan URL
Title: Download on the App Store
Search URL Search Domain Scan URL
Title: Kapcsolatba lépni
Search URL Search Domain Scan URL
Title: Feltételek, Megjegyzés
Search URL Search Domain Scan URL
Title: Jogi információk
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://otpinternet-login.xyz/
HTTP 301
https://otpinternet-login.xyz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
otpinternet-login.xyz/ Redirect Chain
|
8 MB 4 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.4.min.js
code.jquery.com/ |
88 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
otpinternet-login.xyz/static/js/ |
5 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chat.js
otpinternet-login.xyz/static/js/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chat.css
otpinternet-login.xyz/static/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
107 KB 107 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
418 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
129 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
22 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
226 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
41 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
106 KB 106 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
106 KB 106 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
100 KB 100 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
loader.gif
otpinternet-login.xyz/static/img/ |
0 457 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame 4BCA |
129 KB 129 KB |
Document
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
task.url
Submitted on
January 15th 2024, 8:57:21 am
UTC —
From Hungary
Threats:
Phishing
Brand Impersonation
Scam
Comment: The website impersonates the visual elements of the OTP Bank HU.
Phishing website.
Malicious
page.url
Submitted on
January 15th 2024, 8:57:09 am
UTC —
From Hungary
Threats:
Brand Impersonation
Phishing
Scam
Comment: The website impersonates the visual elements of the OTP Bank HU.
Phishing website.
Malicious
page.domain
Submitted on
January 15th 2024, 8:56:57 am
UTC —
From Hungary
Threats:
Brand Impersonation
Phishing
Scam
Comment: The website impersonates the visual elements of the OTP Bank HU.
Phishing website.
Malicious
page.url
Submitted on
January 15th 2024, 8:52:50 am
UTC —
From Hungary
Threats:
Brand Impersonation
Phishing
Scam
Comment: The website impersonates the visual elements of the OTP Bank HU.
Phishing website.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery function| toggleChat function| addMessage function| sendMessage function| handleChatKeyPress function| addChatMessage function| savepage_ShadowLoader number| WindowH number| ChatH function| wsSend1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
otpinternet-login.xyz/ | Name: user_id Value: VtIZk |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
otpinternet-login.xyz
2606:4700:3035::6815:503c
2606:4700:3037::ac43:aeb8
2a04:4e42:600::649
07996835ec1026d40edde253915c1acef1ccc565bb928fd35b2ae91a30b4835f
139000322132870bde1770327d5c33099918141ea9cbb29e544a3dd03a25883d
1a6733bbc1a0433da8696cbef37266a32e1782142e242f5a38bdae707a55682e
2a1c2d0ce7881c42fe2e1d9114ca25a74f79b870fb9622974b27309828a497f9
51a828e7b455161fa0bb00a35c7a1763c1b83fb1effe2f70663b30e47b71a584
55f2cd77ce30d0c626870f2340258d17338c5dcf51590d76d4e9ab02865352bc
6a8dc80f61e0245ed84ef82932d68e164d618739d0a0feb1120f11f70d96497d
847ae3fc07a309823d4dbfc8294a7abff2779392a67f59fe8d0fe22ba0cb3d6c
9db0b35cea2aed60d1621c66ec197456bfb887c3808294087289c67d51d8b50d
a0fe8723dcf55da64d06b25446d0a8513e52527c45afcb37073465f9c6f352af
a1033c6b0ac1e96fa5e639cc2b14a0096e8a62aa14925078ac4e08b42c4aaaa3
a18e2e10e5659c343e1a1b8f8dc0ea8f6f5d0bdca0c27c446517c72a378f9f20
a2431e5b3f94c2bd49b264ed0c0c0417652ecb91658262a11f9a26fe55c8cd5d
a87cba1d08bc5397e7f459b9339b2427c42d824e223839840731f0a2cdd42f69
bc36a0eee0bf0000f32c3b59ea6e639636cbea8ec747675b7201bf31bb92d0e7
bd200e43b7ec1eaa61b7a9b9bb8c332f8a1fe439f107fb82d7a22b014644bda8
d3701bda03d86a02f98f953ce4a37303a68a1e0d70a0ed225e7d85229e9447af
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
eb160cf0c587f4746479eaaf74e4ee6a65399b5931148a85ba4785383f330f35
f36a37a55d481fc67474576bd57e1616845618e2d7dc3c44c3a05bd513f5fa65