dev-innboks-mside-blf80.pantheonsite.io
Open in
urlscan Pro
2620:12a:8001::4
Malicious Activity!
Public Scan
Effective URL: https://dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Telefonnummer/
Submission: On July 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Organization Validation S... on June 6th 2023. Valid for: a year.
This is the only time dev-innboks-mside-blf80.pantheonsite.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BankID (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 2620:12a:8001::4 2620:12a:8001::4 | 54113 (FASTLY) (FASTLY) | |
1 | 193.26.146.6 193.26.146.6 | 207674 (VIPPS-AS) (VIPPS-AS) | |
4 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
pantheonsite.io
1 redirects
dev-innboks-mside-blf80.pantheonsite.io |
34 KB |
1 |
bankid.no
csfe-preprod.bankid.no |
509 B |
4 | 2 |
Domain | Requested by | |
---|---|---|
4 | dev-innboks-mside-blf80.pantheonsite.io |
1 redirects
dev-innboks-mside-blf80.pantheonsite.io
|
1 | csfe-preprod.bankid.no |
dev-innboks-mside-blf80.pantheonsite.io
|
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pantheonsite.io Sectigo RSA Organization Validation Secure Server CA |
2023-06-06 - 2024-07-06 |
a year | crt.sh |
csfe-preprod.bankid.no GlobalSign RSA OV SSL CA 2018 |
2023-02-21 - 2024-03-24 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Telefonnummer/
Frame ID: 39C976FA315F2B1CE465D66D8E2B2E37
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
InnloggingPage URL History Show full URLs
-
https://dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Personnummer/lagre-personnummer.php/
HTTP 302
https://dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Telefonnummer/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Personnummer/lagre-personnummer.php/
HTTP 302
https://dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Telefonnummer/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
dev-innboks-mside-blf80.pantheonsite.io/Informasjon/Telefonnummer/ Redirect Chain
|
27 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
dev-innboks-mside-blf80.pantheonsite.io/Files/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
javascript.js
dev-innboks-mside-blf80.pantheonsite.io/Files/ |
296 B 460 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
KgAAAIYzxN3WxmOfAxVMQDId9-aIAfs9SiOqQVr7NscP8MMOdILwhEk9TFt__yb6JSxDp0e3SvMe3nkhfgbTYyPr5PLb9yrlibw
csfe-preprod.bankid.no/CentralServerFEJS/b/ |
108 B 509 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
172 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
167 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
192 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
760 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
207 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
172 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
296 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
310 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
200 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BankID (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| eb boolean| vhfXfBJjSohsCgBBQFxg_10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=300 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
csfe-preprod.bankid.no
dev-innboks-mside-blf80.pantheonsite.io
193.26.146.6
2620:12a:8001::4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