omakela.net
Open in
urlscan Pro
50.6.160.161
Malicious Activity!
Public Scan
Submission: On October 04 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R11 on October 3rd 2024. Valid for: 3 months.
This is the only time omakela.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Säästöpankki (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 50.6.160.161 50.6.160.161 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
13 | 1 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 50-6-160-161.unifiedlayer.com
omakela.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
omakela.net
omakela.net |
494 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | omakela.net |
omakela.net
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
omakela.net.gwf.dbv.temporary.site R11 |
2024-10-03 - 2025-01-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://omakela.net/SA/6455efc/Login.php
Frame ID: 48E1F666C526AF025DCA0A45B48FF055
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Login.php
omakela.net/SA/6455efc/ |
11 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp_private.min.css
omakela.net/SA/6455efc/style/ |
243 KB 62 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image.png
omakela.net/SA/6455efc/style/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ima.png
omakela.net/SA/6455efc/style/ |
140 KB 140 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
print.css
omakela.net/SA/6455efc/style/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp_sininen_tausta.png
omakela.net/SA/6455efc/style// |
211 KB 211 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DINWeb.woff
omakela.net/SA/6455efc/style// |
30 KB 30 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DINWeb-Bold.woff
omakela.net/SA/6455efc/style// |
30 KB 30 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
omakela.net/SA/6455efc/style/ |
2 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Where_Page.php
omakela.net/SA/6455efc/Select/auto_system/ |
6 B 184 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Where_Page.php
omakela.net/SA/6455efc/Select/auto_system/ |
6 B 81 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Where_Page.php
omakela.net/SA/6455efc/Select/auto_system/ |
6 B 81 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Where_Page.php
omakela.net/SA/6455efc/Select/auto_system/ |
6 B 81 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Säästöpankki (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
omakela.net/ | Name: PHPSESSID Value: 34a64f25b52c4e71aaada8fbf57fff3d |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
omakela.net
50.6.160.161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