d989123.u-telcom.net
Open in
urlscan Pro
213.131.32.170
Malicious Activity!
Public Scan
Submission: On February 02 via automatic, source openphish
Summary
This is the only time d989123.u-telcom.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 213.131.32.170 213.131.32.170 | 15491 (SILKNET ) (SILKNET ) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
u-telcom.net
d989123.u-telcom.net |
158 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | d989123.u-telcom.net |
d989123.u-telcom.net
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://d989123.u-telcom.net/validate/home/confirm.php?public/enroll/IdentifyUser-aspx-LOB=RBGLogon
Frame ID: 14959.1
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
confirm.php
d989123.u-telcom.net/validate/home/ |
9 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
d989123.u-telcom.net/validate/home/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-2.png
d989123.u-telcom.net/validate/home/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-3.png
d989123.u-telcom.net/validate/home/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-5.png
d989123.u-telcom.net/validate/home/images/ |
338 B 338 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-4.png
d989123.u-telcom.net/validate/home/images/ |
123 KB 123 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-7.png
d989123.u-telcom.net/validate/home/images/ |
382 B 382 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1-6.png
d989123.u-telcom.net/validate/home/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
next.png
d989123.u-telcom.net/validate/home/images/ |
562 B 562 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
canvcel.png
d989123.u-telcom.net/validate/home/images/ |
615 B 615 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fotr.png
d989123.u-telcom.net/validate/home/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
det.png
d989123.u-telcom.net/validate/home/images/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
d989123.u-telcom.net/validate/home/images/ |
894 B 894 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d989123.u-telcom.net
213.131.32.170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