s-pushtan-sparkasse.app
Open in
urlscan Pro
2606:4700:3031::6815:b9
Malicious Activity!
Public Scan
Submission: On March 06 via api from EE — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on March 6th 2024. Valid for: 3 months.
This is the only time s-pushtan-sparkasse.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 2606:4700:303... 2606:4700:3031::6815:b9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
s-pushtan-sparkasse.app
s-pushtan-sparkasse.app |
771 KB |
17 | 1 |
Domain | Requested by | |
---|---|---|
17 | s-pushtan-sparkasse.app |
s-pushtan-sparkasse.app
|
17 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.sparkasse.de |
Subject Issuer | Validity | Valid | |
---|---|---|---|
s-pushtan-sparkasse.app GTS CA 1P5 |
2024-03-06 - 2024-06-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://s-pushtan-sparkasse.app/jetzt-verbinden
Frame ID: A9F88745F754BADF77C5D1EC93956A65
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Login Online BankingDetected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*parbase
Select2 (JavaScript Libraries) Expand
Detected patterns
- select2(?:\.min|\.full)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui.*\.js
Page Statistics
37 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Sicherheitshinweise
Search URL Search Domain Scan URL
Title: Online-Banking
Search URL Search Domain Scan URL
Title: Girokonto
Search URL Search Domain Scan URL
Title: Tagesgeldkonto
Search URL Search Domain Scan URL
Title: Festgeldkonto
Search URL Search Domain Scan URL
Title: Sparbuch
Search URL Search Domain Scan URL
Title: Aufladbare Kreditkarte
Search URL Search Domain Scan URL
Title: Kreditkarte
Search URL Search Domain Scan URL
Title: Riester-Rente
Search URL Search Domain Scan URL
Title: Kredit
Search URL Search Domain Scan URL
Title: Privatkredit
Search URL Search Domain Scan URL
Title: Dispokredit
Search URL Search Domain Scan URL
Title: Autokredit
Search URL Search Domain Scan URL
Title: Baufinanzierung
Search URL Search Domain Scan URL
Title: Bausparen
Search URL Search Domain Scan URL
Title: Bauspardarlehen
Search URL Search Domain Scan URL
Title: Hypothekendarlehen
Search URL Search Domain Scan URL
Title: Ihre Pläne
Search URL Search Domain Scan URL
Title: GemeinsamAllemGewachsen
Search URL Search Domain Scan URL
Title: Aktuelle Themen
Search URL Search Domain Scan URL
Title: Firmenkunden
Search URL Search Domain Scan URL
Title: Sparen & Anlegen
Search URL Search Domain Scan URL
Title: Altersvorsorge
Search URL Search Domain Scan URL
Title: Versicherungen
Search URL Search Domain Scan URL
Title: Karriere
Search URL Search Domain Scan URL
Title: Filialen A-Z
Search URL Search Domain Scan URL
Title: Geldautomaten A-Z
Search URL Search Domain Scan URL
Title: Finanzlexikon
Search URL Search Domain Scan URL
Title: SEPA
Search URL Search Domain Scan URL
Title: Karte sperren
Search URL Search Domain Scan URL
Title: Sicherungssystem
Search URL Search Domain Scan URL
Title: Sparkassen Apps
Search URL Search Domain Scan URL
Title: Wir ĂĽber uns
Search URL Search Domain Scan URL
Title: Impressum
Search URL Search Domain Scan URL
Title: Datenschutz
Search URL Search Domain Scan URL
Title: Nutzungshinweise
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
jetzt-verbinden
s-pushtan-sparkasse.app/ |
52 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new.css
s-pushtan-sparkasse.app/assets/ |
2 MB 186 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opsm.css
s-pushtan-sparkasse.app/assets/ |
504 KB 64 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opttan.css
s-pushtan-sparkasse.app/assets/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
perf-meter.css
s-pushtan-sparkasse.app/assets/ |
398 B 564 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ospm_custom.css
s-pushtan-sparkasse.app/assets/ |
18 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.css
s-pushtan-sparkasse.app/assets/ |
35 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.js
s-pushtan-sparkasse.app/assets/ |
282 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.js
s-pushtan-sparkasse.app/assets/ |
517 KB 124 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
select2.min.css
s-pushtan-sparkasse.app/assets/ |
16 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
select2.min.js
s-pushtan-sparkasse.app/assets/ |
71 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_ini.svg
s-pushtan-sparkasse.app/assets/ |
22 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo_ini.svg
s-pushtan-sparkasse.app/assets/ |
22 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Rg.woff
s-pushtan-sparkasse.app/assets/internetfiliale/fonts/ |
41 KB 41 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Bd.woff
s-pushtan-sparkasse.app/assets/internetfiliale/fonts/ |
36 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Md.woff
s-pushtan-sparkasse.app/assets/internetfiliale/fonts/ |
30 KB 31 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pictos-if.woff
s-pushtan-sparkasse.app/assets/internetfiliale/fonts/ |
139 KB 140 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
s-pushtan-sparkasse.app/ | Name: PHPSESSID Value: c194071afd973d3cc29f9f6d430f5a4d |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
s-pushtan-sparkasse.app
2606:4700:3031::6815:b9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