tekuon.com
Open in
urlscan Pro
188.165.129.145
Malicious Activity!
Public Scan
Submission: On September 10 via manual from PL
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on August 3rd 2020. Valid for: 3 months.
This is the only time tekuon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BankID (Banking) Eika Gruppen (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 188.165.129.145 188.165.129.145 | 16276 (OVH) (OVH) | |
5 | 62.92.136.17 62.92.136.17 | 2119 (TELENOR-N...) (TELENOR-NEXTEL Telenor Norge AS) | |
1 | 62.92.136.21 62.92.136.21 | 2119 (TELENOR-N...) (TELENOR-NEXTEL Telenor Norge AS) | |
10 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
portalbank.no
id.portalbank.no www2.portalbank.no |
887 KB |
3 |
tekuon.com
1 redirects
tekuon.com |
3 KB |
0 |
bootstrapcdn.com
Failed
netdna.bootstrapcdn.com Failed |
|
10 | 3 |
Domain | Requested by | |
---|---|---|
5 | id.portalbank.no |
tekuon.com
|
3 | tekuon.com | 1 redirects |
1 | www2.portalbank.no |
tekuon.com
|
0 | netdna.bootstrapcdn.com Failed |
tekuon.com
|
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backupdevelop.ovh Let's Encrypt Authority X3 |
2020-08-03 - 2020-11-01 |
3 months | crt.sh |
id.portalbank.no Buypass Class 3 CA 2 |
2019-10-29 - 2021-11-09 |
2 years | crt.sh |
www2.portalbank.no Buypass Class 3 CA 2 |
2019-02-27 - 2021-03-23 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://tekuon.com/js/jquery/ui/themes/portalbamk/
Frame ID: 6F35C1E16E29A622A812003563599A7E
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://tekuon.com/js/jquery/ui/themes/portalbamk HTTP 301
- https://tekuon.com/js/jquery/ui/themes/portalbamk/
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
tekuon.com/js/jquery/ui/themes/portalbamk/ Redirect Chain
|
0 382 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
tekuon.com/js/jquery/ui/themes/portalbamk/ |
14 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eika-green.css
id.portalbank.no/web-kundeid/dist/css/ |
451 KB 98 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ionicons.css
id.portalbank.no/web-kundeid/dist/css/ |
60 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
id.portalbank.no/web-kundeid/dist/css/ |
12 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bootstrap-combined.no-icons.min.css
netdna.bootstrapcdn.com/twitter-bootstrap/2.3.2/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
font-awesome.css
netdna.bootstrapcdn.com/font-awesome/3.2.1/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
small_logo.jpg
www2.portalbank.no/bankcontent/0770/img/ |
8 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brikke.svg
id.portalbank.no/web-kundeid/dist/img/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bundle.js
id.portalbank.no/web-kundeid/dist/js/ |
2 MB 762 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- netdna.bootstrapcdn.com
- URL
- https://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.2/css/bootstrap-combined.no-icons.min.css
- Domain
- netdna.bootstrapcdn.com
- URL
- https://netdna.bootstrapcdn.com/font-awesome/3.2.1/css/font-awesome.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BankID (Banking) Eika Gruppen (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
tekuon.com/ | Name: PHPSESSID Value: 7ceb94dd7df131d0b4d7e682550a76f2 |
|
tekuon.com/js/jquery/ui/themes/portalbamk | Name: visited Value: yes |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
id.portalbank.no
netdna.bootstrapcdn.com
tekuon.com
www2.portalbank.no
netdna.bootstrapcdn.com
188.165.129.145
62.92.136.17
62.92.136.21
06951624d80fdda468d7efffb27c4de747d0650055b488b326a701cb3fd697b8
189cc6e6c73d0d0daf59da89eb1e31f496db32c7a9efa0360ce8c7ddeb0bee33
1e3ea5c3df7a833e0b373017b46498a393ee3de68109843e89a60dc7c187faf2
53ff8e25fd4202561b67b73bcf6245e6f8ecb1f4b45d5b3b92e1167428f7e479
72da2e711a056e074fae79a2e63a8e759f3843d267491b5d1e0068f3a8d56e97
9ec2c7e9e32b00406ff47a6b4352acb38f4aa2b68802cddcc8317ebbbe4b2c1b
c131ef21d7d6ddab0aa199a4530f8d066e7784cb210ebfb5afb95311495113f9