veronpalautus-omavero.net
Open in
urlscan Pro
95.214.26.34
Malicious Activity!
Public Scan
Submission: On October 11 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 9th 2023. Valid for: 3 months.
This is the only time veronpalautus-omavero.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Nordea (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 95.214.26.34 95.214.26.34 | 216419 (AS-MATRIX...) (AS-MATRIXTELECOM) | |
14 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
veronpalautus-omavero.net
1 redirects
veronpalautus-omavero.net |
175 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | veronpalautus-omavero.net |
1 redirects
veronpalautus-omavero.net
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
veronpalautus-omavero.net R3 |
2023-10-09 - 2024-01-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://veronpalautus-omavero.net/nordea/
Frame ID: F342405E358E96A0856907B8C606BE38
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Nordea - TunnistautuminenPage URL History Show full URLs
-
https://veronpalautus-omavero.net/nordea
HTTP 301
https://veronpalautus-omavero.net/nordea/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://veronpalautus-omavero.net/nordea
HTTP 301
https://veronpalautus-omavero.net/nordea/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
veronpalautus-omavero.net/nordea/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nordea.css
veronpalautus-omavero.net/styles/ |
27 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
veronpalautus-omavero.net/nordea/js/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
key.svg
veronpalautus-omavero.net/images/fourth/ |
1 KB 895 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
attach.js
veronpalautus-omavero.net/nordea/js/ |
6 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
veronpalautus-omavero.net/nordea/js/ |
2 KB 769 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
veronpalautus-omavero.net/nordea/js/ |
1 KB 662 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg3.jpg
veronpalautus-omavero.net/images/fourth/ |
67 KB 67 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nordone.woff
veronpalautus-omavero.net/fonts/ |
3 KB 3 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
eye.svg
veronpalautus-omavero.net/images/fourth/ |
2 KB 950 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
thenordius.woff
veronpalautus-omavero.net/fonts/ |
30 KB 31 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
noradno.woff
veronpalautus-omavero.net/fonts/ |
31 KB 31 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
action.php
veronpalautus-omavero.net/nordea/api/ |
2 B 277 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
event.php
veronpalautus-omavero.net/nordea/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- veronpalautus-omavero.net
- URL
- https://veronpalautus-omavero.net/nordea/api/event.php
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Nordea (Banking)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| makeid function| codeCatcher function| goBack function| errorLogin function| openCode function| errorCode function| openMobile object| _0xdcdc boolean| api_isLoading function| api_init function| api_send function| api_receiveCallback function| api_receive function| api_pollEvent function| api_postImage object| _0x725b function| on_init function| process1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
veronpalautus-omavero.net/ | Name: PHPSESSID Value: cb77saefeji3nide9klrds0oga |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
veronpalautus-omavero.net
veronpalautus-omavero.net
95.214.26.34
11055d13ced175bf9c58a58d75dbe894231a318ae53f4f83ee52528d63a7f0db
21a2a17b532837aeafeb95de9f252bfec714028517f79fb4143845ca4d23353c
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3
6252319c96777a4ce3952f63ec70735230c1c5c9392e81a9b3f9a8b2bc06c164
836393ac52708bd75b2e1c88defb51faa58f0fdfa374d57d2529e0a6554882ff
8ed6097c55d1b58ed4bde4548b4636cdcc5ae707f8c91696486b2768feefbebc
aec1ba8bac743311c8d2845f4cdb3b092e04b3c7e03edcd97599d03954d8b22f
b88b6130e6d786e3793f9811c6ad215e23237c3875b1bd85330505dc8ff350f9
bf39ff4236b2f9776680bf118a4a64f698bbcac96f259c5180d8735f14ed8e0a
bfb34131a8e7dcc92373d45da4d7f868cd49b199a04197a349b4a04f215a21f8
eaa8b6005f26f5388966d4b66bb11429447c86af9b835da8c1840a95ef516971
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e
ff28a732b1fc6a547797b7a9a7c29025ae41b74cc5e208232418d9c41fb43c44