aflossen.xyz
Open in
urlscan Pro
2606:4700:3030::6815:1e82
Malicious Activity!
Public Scan
Effective URL: https://aflossen.xyz/anwb.php
Submission: On February 11 via manual from NL — Scanned from NL
Summary
TLS certificate: Issued by E1 on February 11th 2022. Valid for: 3 months.
This is the only time aflossen.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Transportation (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 104.244.42.5 104.244.42.5 | 13414 (TWITTER) (TWITTER) | |
1 1 | 193.177.222.210 193.177.222.210 | 396982 (GOOGLE-PR...) (GOOGLE-PRIVATE-CLOUD) | |
1 1 | 178.210.66.40 178.210.66.40 | 48287 (RU-CENTER) (RU-CENTER) | |
14 | 2606:4700:303... 2606:4700:3030::6815:1e82 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 185.139.247.114 185.139.247.114 | 47957 (ING-AS) (ING-AS) | |
16 | 3 |
ASN396982 (GOOGLE-PRIVATE-CLOUD, US)
PTR: 193.177.222.210.static.xtom.com
u.nu |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
aflossen.xyz
aflossen.xyz |
75 KB |
1 |
ogone.com
secure.ogone.com — Cisco Umbrella Rank: 221128 |
1 KB |
1 |
qiop.io
1 redirects
qiop.io |
370 B |
1 |
u.nu
1 redirects
u.nu |
558 B |
1 |
t.co
t.co — Cisco Umbrella Rank: 456 |
499 B |
16 | 5 |
Domain | Requested by | |
---|---|---|
14 | aflossen.xyz |
t.co
aflossen.xyz |
1 | secure.ogone.com |
aflossen.xyz
|
1 | qiop.io | 1 redirects |
1 | u.nu | 1 redirects |
1 | t.co | |
16 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.entrust.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
t.co DigiCert TLS RSA SHA256 2020 CA1 |
2022-01-06 - 2023-01-05 |
a year | crt.sh |
*.aflossen.xyz E1 |
2022-02-11 - 2022-05-12 |
3 months | crt.sh |
secure.ogone.com Entrust Certification Authority - L1M |
2019-12-31 - 2022-03-30 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://aflossen.xyz/anwb.php
Frame ID: E2ABDE6B12BE29BD046F0AA8F54CF935
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Betaling - ANWB factuurPage URL History Show full URLs
- https://t.co/D4o0EA6gmC Page URL
-
https://u.nu/afaKC
HTTP 301
https://qiop.io/D1R7Ci HTTP 301
https://aflossen.xyz/anwb.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- require.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery Migrate (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://t.co/D4o0EA6gmC Page URL
-
https://u.nu/afaKC
HTTP 301
https://qiop.io/D1R7Ci HTTP 301
https://aflossen.xyz/anwb.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
D4o0EA6gmC
t.co/ |
209 B 499 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
anwb.php
aflossen.xyz/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wait_turn.gif
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
85 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-migrate-1.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Class.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
required_fields.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
form_validation.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
22 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iDeal_STD.gif
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Fp_inc.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
13 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base64_inc.js
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RABOBANK.gif
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
67 B 381 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pp_Ingenico-ePayments8.gif
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
entrust_site_seal_large.png
aflossen.xyz/Betaling%20-%20ANWB%20factuur_files/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wait_turn.gif
secure.ogone.com/images/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Transportation (Transportation)99 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone undefined| ncolwaitwindow number| ncolwaitwindowopen function| ShowWaitMsg function| my_submitAndWait function| justWait function| close_ncol_wait undefined| $ undefined| jQuery function| Class function| trustHTML object| OGONE object| requiredNames function| getRequiredNames function| setRequired function| setAttrNS function| createHiddenInput number| js_version function| ddValue function| valueIsUndefined function| strReplace function| Convert2Float function| isNumber function| isInt function| containsNoN function| are2Numbers function| xor function| FormFieldsA function| DependenciesA function| FieldDescriptor function| evalFormFields function| isValidEMail function| isValidUrl function| isValidSIC function| checkCCValid_Short function| checkCCValid function| my_submitAndDisable function| my_submit function| getInfoBrandFromCardNb function| Is_cvcOK function| evalFormFieldsN function| checkEMail function| checkEmailInput function| checkEMailECML function| checkCVCAndPresInd string| AlertMSG_109 string| AlertMSG_110 string| AlertMSG_173 string| AlertMSG_1205 string| AlertMSG_111 string| AlertERR_907 string| AlertERR_95 string| AlertERR_96 function| getNavigatorPlatform function| getNavigatorOsCpu function| getNavigatorUserAgent function| getNavigatorAppName function| getNavigatorAppVersion function| getNavigatorPluginFnames function| getNavigatorPluginDescs function| addPluginDescForIe function| getAdobeReaderVerForIe function| getFlashPlayerVerForIe function| getQuickTimePlayerVerForIe function| getRealPlayerVerForIe function| getShockwavePlayerVerForIe function| getWinMediaPlayerVerForIe function| getNavigatorMimeTypes function| submitForm function| getCurDateTime function| getJsVersion undefined| g_commonHdAr undefined| g_ieHdAr function| fillHdFromMultiDimArHd function| getHdForDirectPostFromMultiDimArHd function| createMultiDimArHd function| addElInMultiDimArHd function| getHdForDirectPost function| fillHdJs function| grabFocus function| javaStatus function| flashStatus function| javaPostException function| javaCaptureException function| flashPostException function| javaCapture function| flashCapture number| g_iWaitPer object| g_dStartSubmit function| isJavaStsOk function| isJavaStsOk2 function| waitDuring function| isMSIE function| ieComponentVersion function| probeActiveX function| probeMimeTypesForJava function| detectJava function| javaVersion object| Base645 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.t.co/ | Name: muc Value: 895cbc2c-a0a0-4d8a-bcb6-39d82ee8bbe0 |
|
u.nu/ | Name: PHPSESSID Value: lb5dvuhsdl7inb4h0rh00iopr7 |
|
u.nu/ | Name: short_1597522 Value: 1 |
|
qiop.io/ | Name: PHPSESSID Value: f39fae894a41779724019e50c0418d0d |
|
qiop.io/ | Name: short_D1R7Ci Value: 1 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=0 |
X-Xss-Protection | 0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aflossen.xyz
qiop.io
secure.ogone.com
t.co
u.nu
104.244.42.5
178.210.66.40
185.139.247.114
193.177.222.210
2606:4700:3030::6815:1e82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