metbank.bir.ru
Open in
urlscan Pro
2606:4700:3032::ac43:d848
Malicious Activity!
Public Scan
Effective URL: https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-m...
Submission: On June 17 via manual from US — Scanned from GB
Summary
TLS certificate: Issued by WE1 on June 11th 2024. Valid for: 3 months.
This is the only time metbank.bir.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 185.64.213.245 185.64.213.245 | 50152 (IMED) (IMED) | |
1 1 | 2606:4700::68... 2606:4700::6812:4528 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 146.70.81.27 146.70.81.27 | 9009 (M247) (M247) | |
1 5 | 2606:4700:303... 2606:4700:3032::ac43:d848 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 2 |
ASN50152 (IMED, GB)
PTR: url.emailprotection.link
url.emailprotection.link |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
emailprotection.link
url.emailprotection.link — Cisco Umbrella Rank: 163041 |
403 KB |
5 |
bir.ru
1 redirects
metbank.bir.ru |
9 KB |
1 |
xovr45.sbs
1 redirects
xovr45.sbs |
336 B |
1 |
beehiiv.com
1 redirects
link.mail.beehiiv.com — Cisco Umbrella Rank: 65760 |
425 B |
15 | 4 |
Domain | Requested by | |
---|---|---|
11 | url.emailprotection.link |
url.emailprotection.link
|
5 | metbank.bir.ru |
1 redirects
url.emailprotection.link
metbank.bir.ru |
1 | xovr45.sbs | 1 redirects |
1 | link.mail.beehiiv.com | 1 redirects |
15 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.emailprotection.link GeoTrust TLS RSA CA G1 |
2023-07-10 - 2024-08-09 |
a year | crt.sh |
metbank.bir.ru WE1 |
2024-06-11 - 2024-09-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter
Frame ID: 9752C3B8DB9C33DC01D7B7DA9CB0F592
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
404 Not FoundPage URL History Show full URLs
- https://url.emailprotection.link/?bkTI3N6UOfhYubs4WK0sxsp2SSLz76PYy4TUQDyjYUrYOfjw-91vJ3dV_RUp6oPl0-ezoJ4NR8o... Page URL
-
https://link.mail.beehiiv.com/ls/click?upn=u001.AafWW5Nqnbo2z-2BTA50bGESfAYxCHIVFnlvUjYtXIDgmDq0wG2oRyqCZj...
HTTP 302
https://xovr45.sbs/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_c... HTTP 301
https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter... Page URL
-
https://metbank.bir.ru/cdn-cgi/phish-bypass?atok=cf2QfKjPwvkdNaA.sh3WpsyKb4bD8UpYlOf1SwbHlEs-171863...
HTTP 301
https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://url.emailprotection.link/?bkTI3N6UOfhYubs4WK0sxsp2SSLz76PYy4TUQDyjYUrYOfjw-91vJ3dV_RUp6oPl0-ezoJ4NR8oUaCJf10vSX9FtdPlNjpiftKjbYhSnBB5xydn0QExLPuyl7E5yJ7z-d8wU8EC_kq2TG7GIwroC1KeyTqbZkSiWtDbp4SLHbgsD6fESaStWLXDZqn6NEI6ywi5P-zCjYhy58KX5i9dsaK3hiaegA6V9jruDceTJ1qosCm6UCpvcwJqHT_OaB2wBLVXMTgrT5ft_pgJpaxnmGbTN0yUfLXzc-GeVkmvBfCw9XBrWJRiXepkTVqOb10gzKg3gnMCdzCBTvBD6JqsZywDzIICiacC77ZmyfiZUvTvKxGqeKmncoYCFNfGQqYo_lG_G8W_jijkuJFc5_vto6cq82fla16U9cG1mGrnGx3klqCjP0rb8Yu-3_BaMg_XWXG3Un5-kZqxdrrbG3Dzjj4hD3D2knB0zg0_srjGWsv0f-NqkcrHLvG0Av2vKZOuddqoYOnfyKEpSv_N16M1uJdHsDhCVQL7vt8NYtVPFIenhKHtEdg7mFGMbn8x7sFWM0JfHeDBNMzKc7aubgiJP2UpUYMPOVcXFYMiTg4YUMcr8JmAUX5wKfltKFkP2jvZtgYUC1xUJaTOcVm7SOFwX0Sr5zltOmTgUp7FFsLjdaKa4jcugQu4AvVzht5Vv297yOEsdCQG80ww3PUie-phQuODt4xgTdvwNQ3xIs8dBQja7uI0L8PjLt9CE7ZHBAe7Nr_M7Dwy4ELVvzFR_0mYPBhmaT18_acr_JjDG4B5Zyh_w~ Page URL
-
https://link.mail.beehiiv.com/ls/click?upn=u001.AafWW5Nqnbo2z-2BTA50bGESfAYxCHIVFnlvUjYtXIDgmDq0wG2oRyqCZj-2FxmG5FH1atqNg5rPkgcEY9pOagg1ZaaNlpTpdz0dPdxAi0OthYVXjUlMomr6uDZ-2FhmxI6c7a4LfVa1QNG4Byd0TPgSq6ywamjTpkSMzYHCas-2BzveDWc-3DqoOv_xroZV4Ue6fiyeSXiwiFetfU1E50Avbp7sFBLfO1mCjc-2Fn0VSsGPwu3MtfGmcR81YGRK2nggJCa0bH1g7Apu885sdrshBroLOKSDU1QyDtnMGfElFYOZMiFR1kPonAbonn9gGohTvSg64uqIeBnFjfXm7ZVGnH2Hh8BvuDzQU9rIEmbRqzq659RjKI4S54HeAdrAFqjhEufcgGsclHhr6n-2B6zriNiaMLcjxSsM-2FALblE-2FAPJuwqMkILQa2ZfOdXiDgeWNvvMSXgNYicXAWoV7nIwALpMs1M-2FBHCDWoDqHpKkmuzytfPTUPxkNAn5Wp-2FTpqd-2FCIMH8VDKLjNrGVEhX-2Fi0BDlMiPyN7XAOQSsNPw2JmAt3Eok-2BMi-2Fv4WkULt3pt1guRapkT-2BAzxmnBqPQRgZEV-2BYADy72ae6qWCCuIv-2Bs02rZ8fhgNxexqmzvxlDN5D
HTTP 302
https://xovr45.sbs/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter HTTP 301
https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter Page URL
-
https://metbank.bir.ru/cdn-cgi/phish-bypass?atok=cf2QfKjPwvkdNaA.sh3WpsyKb4bD8UpYlOf1SwbHlEs-1718639917-0.0.1.1-%2FbCXtk%2F%3Futm_source%3Dglenns-newsletter-0e5f1d.beehiiv.com%26utm_medium%3Dnewsletter%26utm_campaign%3Ddark-matter
HTTP 301
https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 11- https://link.mail.beehiiv.com/ls/click?upn=u001.AafWW5Nqnbo2z-2BTA50bGESfAYxCHIVFnlvUjYtXIDgmDq0wG2oRyqCZj-2FxmG5FH1atqNg5rPkgcEY9pOagg1ZaaNlpTpdz0dPdxAi0OthYVXjUlMomr6uDZ-2FhmxI6c7a4LfVa1QNG4Byd0TPgSq6ywamjTpkSMzYHCas-2BzveDWc-3DqoOv_xroZV4Ue6fiyeSXiwiFetfU1E50Avbp7sFBLfO1mCjc-2Fn0VSsGPwu3MtfGmcR81YGRK2nggJCa0bH1g7Apu885sdrshBroLOKSDU1QyDtnMGfElFYOZMiFR1kPonAbonn9gGohTvSg64uqIeBnFjfXm7ZVGnH2Hh8BvuDzQU9rIEmbRqzq659RjKI4S54HeAdrAFqjhEufcgGsclHhr6n-2B6zriNiaMLcjxSsM-2FALblE-2FAPJuwqMkILQa2ZfOdXiDgeWNvvMSXgNYicXAWoV7nIwALpMs1M-2FBHCDWoDqHpKkmuzytfPTUPxkNAn5Wp-2FTpqd-2FCIMH8VDKLjNrGVEhX-2Fi0BDlMiPyN7XAOQSsNPw2JmAt3Eok-2BMi-2Fv4WkULt3pt1guRapkT-2BAzxmnBqPQRgZEV-2BYADy72ae6qWCCuIv-2Bs02rZ8fhgNxexqmzvxlDN5D HTTP 302
- https://xovr45.sbs/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter HTTP 301
- https://metbank.bir.ru/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
url.emailprotection.link/ |
8 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new_style.css
url.emailprotection.link/new/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new_screenshot.js
url.emailprotection.link/new/js/ |
1 KB 979 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tooltipster.css
url.emailprotection.link/new/css/ |
10 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.js
url.emailprotection.link/new/js/libs/ |
142 KB 47 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.tooltipster.min.js
url.emailprotection.link/new/js/libs/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
new_scanning.js
url.emailprotection.link/new/js/ |
947 B 758 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scanning_70.gif
url.emailprotection.link/new/images/ |
30 KB 30 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_160_19.svg
url.emailprotection.link/new/images/ |
1 KB 1005 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
notosans-regular.ttf
url.emailprotection.link/new/fonts/ |
306 KB 306 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon_ui.ico
url.emailprotection.link/new/images/ |
894 B 1 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
metbank.bir.ru/bCXtk/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
metbank.bir.ru/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
metbank.bir.ru/cdn-cgi/images/ |
452 B 541 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
metbank.bir.ru/bCXtk/ Redirect Chain
|
1 KB 1016 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.beehiiv.com/ | Name: __cf_bm Value: vInJKfodmVyx1vqnLSdRrJ04LjsVQTQMSPKhCmzz4rs-1718639916-1.0.1.1-22XUwJDhPoqXggQPkxQkwTcfJzbXB_eqWtN6SEXU2DE3T1cwzsHEJ3sQcjEkJUjjD.kdOUTeGBd_Fdqjoj_FNw |
|
.metbank.bir.ru/ | Name: __cf_mw_byp Value: cf2QfKjPwvkdNaA.sh3WpsyKb4bD8UpYlOf1SwbHlEs-1718639917-0.0.1.1-/bCXtk/?utm_source=glenns-newsletter-0e5f1d.beehiiv.com&utm_medium=newsletter&utm_campaign=dark-matter |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
link.mail.beehiiv.com
metbank.bir.ru
url.emailprotection.link
xovr45.sbs
146.70.81.27
185.64.213.245
2606:4700:3032::ac43:d848
2606:4700::6812:4528
04ba8897950ca15879762ccae3323b8f0952259461c13c3e90d6d973b213133c
679e7e62b81267c93d0778083ae0fd0efe24172ff0ac581835b54165b3d9ed43
6938c77be180b60f67086ac99a2692f9af393675279711f0dad73d541b675964
7d8d729017c5d5d7e51c687274fb47335f0727eb4efc009adb5f1e2a2c9ad49e
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
8be2e88f4beed8e6d7c70115a1b71fa50c5da67abbc6e7f393a4960613079069
9ecc9c18cc678408cc6d96b178d58b029b337ba393d86b0b4ca397665d78dd25
af3daca7fe9315515c1fa21ccc9fe4945a300a98bc4697dcffa052389643a406
b12ac9e2fa728424155567aa27e3d36d764b33f07d663e496dc178974048a6f8
c8cff31fcae0edc0e4ffd3628f36361dfc24d71cc5b9793e5ffad8e76e6f182b
c92b1aece38d5bae7bfb72e26a5070d5663d40774c7aceb973631025d6e6e592
ca8178a737bdd4e6d2394e6c5609d1ca001254667458bb9cd1130bacea58cb86
d17232bb1555a2f83c7fbc4a697de155b604e9f7afe233e1a9b28d9590328e64
e337f687babe708a9f8e6642d7793ee3ed5eb4696cf11e28dd0682a858a591ea
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016