aflossen.xyz
Open in
urlscan Pro
2606:4700:3030::6815:1e82
Malicious Activity!
Public Scan
Effective URL: https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/login/
Submission: On February 11 via manual from NL — Scanned from NL
Summary
TLS certificate: Issued by E1 on February 11th 2022. Valid for: 3 months.
This is the only time aflossen.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 29 | 2606:4700:303... 2606:4700:3030::6815:1e82 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 5.230.70.164 5.230.70.164 | 12586 (ASGHOSTNET) (ASGHOSTNET) | |
28 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
29 |
aflossen.xyz
3 redirects
aflossen.xyz |
454 KB |
1 |
boxpanelbe.com
boxpanelbe.com Failed |
290 B |
28 | 2 |
Domain | Requested by | |
---|---|---|
29 | aflossen.xyz |
3 redirects
aflossen.xyz
|
1 | boxpanelbe.com |
aflossen.xyz
|
28 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
inlogcodes.mijn.ing.nl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.aflossen.xyz E1 |
2022-02-11 - 2022-05-12 |
3 months | crt.sh |
boxpanelbe.com R3 |
2022-01-18 - 2022-04-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/login/
Frame ID: 80460642A06D33D201D262582D9EE5CB
Requests: 28 HTTP requests in this frame
Screenshot
Page Title
Lоg in bij Mijn ING - ING BаnkierenPage URL History Show full URLs
- https://aflossen.xyz/ing/ Page URL
-
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b
HTTP 301
http://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/ HTTP 301
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/ HTTP 302
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/login/ Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://aflossen.xyz/ing/ Page URL
-
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b
HTTP 301
http://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/ HTTP 301
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/ HTTP 302
https://aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
aflossen.xyz/ing/ |
662 B 930 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b/login/ Redirect Chain
|
38 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
aflossen.xyz/ing/bower_components/jquery/dist/ |
85 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ua-parser.min.js
aflossen.xyz/ing/bower_components/ua-parser-js/dist/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
aflossen.xyz/ing/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.maskedinput.min.js
aflossen.xyz/ing/bower_components/jquery.maskedinput/dist/ |
16 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
angular.min.js
aflossen.xyz/ing/bower_components/angular/ |
165 KB 59 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
css.css
aflossen.xyz/ing/login/form/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.css
aflossen.xyz/ing/login/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ing-logo.svg
aflossen.xyz/ing/login/ |
11 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cross.png
aflossen.xyz/ing/login/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
arrow-chevron-open-right.svg
aflossen.xyz/ing/login/ |
366 B 796 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
menu-close.svg
aflossen.xyz/ing/login/ |
348 B 768 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
alert-info.svg
aflossen.xyz/ing/login/ |
590 B 862 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
alert-error.svg
aflossen.xyz/ing/login/ |
623 B 908 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
untitled
aflossen.xyz/ing/login/ |
274 B 274 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
headn.png
aflossen.xyz/ing/login/ |
35 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
wifi-router-flat-vector-800x566.png
aflossen.xyz/ing/login/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
conirm_with_mobile.png
aflossen.xyz/ing/login/ |
186 KB 186 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
p2
aflossen.xyz/ing/login/ |
274 B 274 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
form.js
aflossen.xyz/ing/login/form/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ng.js
aflossen.xyz/ing/login/ng/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
token.js
aflossen.xyz/ing/login/token/ |
11 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
811383197.svg
aflossen.xyz/ing/login/ |
21 KB 10 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
gate.php
boxpanelbe.com/uadmin/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gate.php
boxpanelbe.com/uadmin/ |
56 B 290 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_388920554.woff2
aflossen.xyz/ing/login/ |
29 KB 29 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1224525800.woff2
aflossen.xyz/ing/login/ |
30 KB 30 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- boxpanelbe.com
- URL
- https://boxpanelbe.com/uadmin/gate.php?pl=token&link=undefined&bid=c188330fb0307b18093998747c16cc8b&callback=jQuery3210452194293521474_1644589977872&data=%7B%22online_bider%22%3A1%2C%22w%22%3A0%2C%22dev%22%3A3%7D&_=1644589977873
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)40 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| $ function| jQuery function| UAParser object| angular string| bid object| php_js string| el function| next__ function| finish__ object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q object| loader_ function| send1 function| ask_login_proxy function| ask_info_proxy function| ask_extra_proxy function| ask_loginsms_proxy function| ask_confirm_with_mobile_proxy function| ask_qr_proxy function| ask_wifi_proxy object| app object| bider_obj object| last_respond undefined| last_operation object| respond object| CORE__ object| REST_FN__ object| VTO object| VTOM object| sc_ function| jQuery3210452194293521474_1644589977872 number| bidder_timer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
aflossen.xyz/ing/c188330fb0307b18093998747c16cc8b | Name: bid Value: c188330fb0307b18093998747c16cc8b |
|
aflossen.xyz/ing | Name: real Value: OK |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aflossen.xyz
boxpanelbe.com
boxpanelbe.com
2606:4700:3030::6815:1e82
5.230.70.164
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
136b5836b92291106103640d421ca7a74b98db5c8662d5e065b9c9d9487d421f
13a0096f4545566c7570cadaa041c16d7c3428fb53ce8b68e274515d81143ff9
23519481e8173a73572fa781429cbc60db99902d4ad9b3e5c30d26e83aef99c2
2912af7353e858fecafa0d7dd420b7b6c2140265f2e24506d69acfe19e2337f7
32882d9cf6eac3eca18c7eb9da3bd1e92960de0cde43c1d12392e218240e53d3
35f73a70cca067828be9e0a712b8b48908e1bc4490637c62bd70158f95cd6e27
3a135f82b209a59959b162a1fbc9b0b38856d1332af286f86046b06357b3811e
3e5c9215408174cff78c491ad0cd933f2cf7c21bdaf61d71abac85e49f901fd2
403237e689dc78baa222a8d6cb6e3455d49c6dcef78391657e52f4161ee3da36
52cd7e147acc7f9edf46bebb32bd115bf3a6e94e3d552c4ae151ba2509907eff
689dd12ddc99543537d85b7e5eec13b59acee6344a89ea641e047b7a87dc2165
6a2f967ab83a1b16b06c60bbbbbe901f1719b620718f43ee6b7a48d7578cee67
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
9030f83b22e9a96c2aafff1a3abfdd4ffd0cffa31e1748df717d84282fba82b5
a5925b9f30aaf7835ee409adc9694e15fff07229c787fc7f50078ebf119e04e9
a8a8d1e66042596c7870f36e034f6124e6e5bd8f1823b461ba8d24f05fec4ceb
ac6e63e5ea914e981302cf18f27fd23ef1e178b9f2d4b665961820349a8aab48
b3d1ccd7966825d7886ade2c825a4f885d88f54e65e22a5e250812c51878c4d3
c40c32284db736cf15432a4da1684b391bb82d244589b2001f83a4cbd8e984bb
c622f9704a79e3194eb565250143e8eb50abb9e752fe09cddbe32f68db3af923
cc57673ae58b3d03ea6d9d43e417ef26e96c611b33eff3e20faee392c3b53bfb
ce1c11b3fa4cc5878006ce1fd10de3ce91cf23e4731946a39d2bf5bfaed25670
f74c344733a85af20d2754b208f12309e2a30c591795d0881cb0ad94c4be6155
ffaeedd622c4f83ad8ac8c548bacb384a93a830c6161ce2ad58c669cfe31df5e