betaling.postnord.dk.service.fibrac.com.py
Open in
urlscan Pro
66.94.96.105
Malicious Activity!
Public Scan
Effective URL: https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5/
Submission: On November 09 via manual from GB — Scanned from GB
Summary
TLS certificate: Issued by R3 on November 4th 2021. Valid for: 3 months.
This is the only time betaling.postnord.dk.service.fibrac.com.py was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 173.212.224.210 173.212.224.210 | 51167 (CONTABO) (CONTABO) | |
2 4 | 66.94.96.105 66.94.96.105 | 40021 (CONTABO) (CONTABO) | |
6 | 185.42.168.133 185.42.168.133 | 62248 (MODIRUM) (MODIRUM) | |
1 | 202.59.80.192 202.59.80.192 | 17563 (NEXLINX-A...) (NEXLINX-AS-AP Autonomous System Number for Nexlinx) | |
9 | 3 |
ASN40021 (CONTABO, US)
PTR: vmi636860.contaboserver.net
betaling.postnord.dk.service.fibrac.com.py |
ASN17563 (NEXLINX-AS-AP Autonomous System Number for Nexlinx, PK)
PTR: cpanel.nexlinx.net.pk
www.lexiumlaw.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
3dsecure.no
acs4.3dsecure.no |
9 KB |
4 |
fibrac.com.py
2 redirects
betaling.postnord.dk.service.fibrac.com.py |
8 KB |
2 |
zero4.mk
2 redirects
zero4.mk |
510 B |
1 |
lexiumlaw.com
www.lexiumlaw.com |
378 KB |
9 | 4 |
Domain | Requested by | |
---|---|---|
6 | acs4.3dsecure.no |
betaling.postnord.dk.service.fibrac.com.py
acs4.3dsecure.no |
4 | betaling.postnord.dk.service.fibrac.com.py |
2 redirects
betaling.postnord.dk.service.fibrac.com.py
|
2 | zero4.mk | 2 redirects |
1 | www.lexiumlaw.com |
betaling.postnord.dk.service.fibrac.com.py
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.betaling.postnord.dk.service.fibrac.com.py R3 |
2021-11-04 - 2022-02-02 |
3 months | crt.sh |
acs.3dsecure.no GlobalSign GCC R3 DV TLS CA 2020 |
2021-01-25 - 2022-02-26 |
a year | crt.sh |
www.lexiumlaw.com R3 |
2021-11-08 - 2022-02-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5/
Frame ID: C8458F4D703E63B7E17A7B0CCF1BAE42
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
GodkendelsePage URL History Show full URLs
-
https://zero4.mk/tki
HTTP 301
https://zero4.mk/tki/ HTTP 302
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/ HTTP 302
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5 HTTP 301
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://zero4.mk/tki
HTTP 301
https://zero4.mk/tki/ HTTP 302
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/ HTTP 302
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5 HTTP 301
https://betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5/ Redirect Chain
|
6 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
screen.css
acs4.3dsecure.no/mdpayacs/content/040/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gh-buttons.css
acs4.3dsecure.no/mdpayacs/content/040/dk/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
commons.js
acs4.3dsecure.no/mdpayacs/content/ |
1 KB 823 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.min.js
acs4.3dsecure.no/mdpayacs/content/040/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
date_time.js
betaling.postnord.dk.service.fibrac.com.py/wp-tki/365f7208b5fff7aa3fd176d8a40b94f5/Autentisering_files/ |
823 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
unnamed.png
www.lexiumlaw.com/ |
378 KB 378 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.min.js
acs4.3dsecure.no/mdpayacs/content/040/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gh-icons.png
acs4.3dsecure.no/mdpayacs/content/040/dk/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| changeLanguage function| submitEnter function| dotToComma function| updateViewportOrientation function| date_time function| onBodyLoad function| validate object| date number| year number| month object| months number| d number| day object| days number| h string| m number| s string| result0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
acs4.3dsecure.no
betaling.postnord.dk.service.fibrac.com.py
www.lexiumlaw.com
zero4.mk
173.212.224.210
185.42.168.133
202.59.80.192
66.94.96.105
018c7d12a799726510b7d6e7ce4a18023b3f70aded8102d3cdee725f34175658
2d28237cafac6d001bcb6a4db09888fb0ce178ca3de50cf59bd7aca6ad7c2166
2da2729846948ccfd97ed924936cdc406a1037b4af9bf77d98027c1576d8f8cd
4240658116347f70eea6163be279c9c3680dd81cb5f06275bd6a733dab1a91fc
507e7830c8a85c7fe5971122551713e56b7e4a34283ca8410925729efd6e39dc
686251c35af3f83c0532d534a4df34651f06a875fe2b70a7f450c702106f2555
c755ac1453166b808d71cdcd5ddce44e18137d626666e38564feeedfb7cdd1cb