thirsty-dhawan.91-218-65-223.plesk.page
Open in
urlscan Pro
91.218.65.223
Malicious Activity!
Public Scan
Effective URL: https://thirsty-dhawan.91-218-65-223.plesk.page/volks/
Submission: On April 04 via manual from AT — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 4th 2023. Valid for: 3 months.
This is the only time thirsty-dhawan.91-218-65-223.plesk.page was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Volksbank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 35.244.149.249 35.244.149.249 | 15169 (GOOGLE) (GOOGLE) | |
1 4 | 91.218.65.223 91.218.65.223 | 44486 (SYNLINQ s...) (SYNLINQ synlinq.de) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2620:0:862:ed... 2620:0:862:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
2 | 2606:4700:e2:... 2606:4700:e2::ac40:850f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 193.110.183.206 193.110.183.206 | 24656 (ARZ) (ARZ) | |
9 | 6 |
ASN15169 (GOOGLE, US)
PTR: 249.149.244.35.bc.googleusercontent.com
lihi3.cc |
ASN44486 (SYNLINQ synlinq.de, DE)
PTR: plesk2.living-bots.net
thirsty-dhawan.91-218-65-223.plesk.page |
ASN24656 (ARZ, AT)
PTR: arz-193-110-183-206.arz.at
banking.volksbank.at |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
plesk.page
1 redirects
thirsty-dhawan.91-218-65-223.plesk.page |
23 KB |
2 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1034 |
98 KB |
2 |
lihi3.cc
2 redirects
lihi3.cc |
1 KB |
1 |
volksbank.at
banking.volksbank.at |
50 KB |
1 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 2601 |
218 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 357 |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
6 KB |
9 | 7 |
Domain | Requested by | |
---|---|---|
4 | thirsty-dhawan.91-218-65-223.plesk.page |
1 redirects
thirsty-dhawan.91-218-65-223.plesk.page
|
2 | use.fontawesome.com |
thirsty-dhawan.91-218-65-223.plesk.page
|
2 | lihi3.cc | 2 redirects |
1 | banking.volksbank.at |
thirsty-dhawan.91-218-65-223.plesk.page
|
1 | upload.wikimedia.org |
thirsty-dhawan.91-218-65-223.plesk.page
|
1 | ajax.googleapis.com |
thirsty-dhawan.91-218-65-223.plesk.page
|
1 | cdnjs.cloudflare.com |
thirsty-dhawan.91-218-65-223.plesk.page
|
9 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
thirsty-dhawan.91-218-65-223.plesk.page R3 |
2023-04-04 - 2023-07-03 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-03-13 - 2023-06-05 |
3 months | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2022-10-27 - 2023-11-17 |
a year | crt.sh |
www.volksbank.at DigiCert SHA2 Extended Validation Server CA |
2022-06-24 - 2023-06-24 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://thirsty-dhawan.91-218-65-223.plesk.page/volks/
Frame ID: ED7FEB85F051764E46077F1AED3EC516
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Online Bank AccountPage URL History Show full URLs
-
http://lihi3.cc/RLDIE
HTTP 302
https://lihi3.cc/RLDIE HTTP 302
https://thirsty-dhawan.91-218-65-223.plesk.page/volks HTTP 301
https://thirsty-dhawan.91-218-65-223.plesk.page/volks/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://lihi3.cc/RLDIE
HTTP 302
https://lihi3.cc/RLDIE HTTP 302
https://thirsty-dhawan.91-218-65-223.plesk.page/volks HTTP 301
https://thirsty-dhawan.91-218-65-223.plesk.page/volks/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
thirsty-dhawan.91-218-65-223.plesk.page/volks/ Redirect Chain
|
6 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
thirsty-dhawan.91-218-65-223.plesk.page/volks/css/ |
143 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cs.css
thirsty-dhawan.91-218-65-223.plesk.page/volks/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Volksbank-LOGO.jpg
upload.wikimedia.org/wikipedia/commons/9/98/ |
217 KB 218 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
solid.js
use.fontawesome.com/releases/v5.0.8/js/ |
277 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome.js
use.fontawesome.com/releases/v5.0.8/js/ |
27 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-background.jpg
banking.volksbank.at/banking/resource/502991b75a727ce6e0c3fbf19ee9650cd8a12f00/m101/images/ |
49 KB 50 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Volksbank (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
lihi3.cc/ | Name: redirect_id Value: eyJpdiI6IlRuZEs3aVN5blNuaWsrblZmMlJEb1E9PSIsInZhbHVlIjoiZUFXK1l2VDJ6NjJxTEFGeWNyRG9jdU5Od3JkdmtNVDFJSlJIazJGc1R6U0k1blo5QTlPejlFTFUxTmhzcnZ0KyIsIm1hYyI6ImYyOTFkY2ZmYTZkMmMzOGM1MGRkMGFkOTk1MDRiNjk5OWUzOTQ5OGEzOWE4ZGVhZDJjNTVkMGM4OTk1NDcwM2MifQ%3D%3D |
|
lihi3.cc/ | Name: lihi_session Value: eyJpdiI6Ik5HRUpzeU50UmRlb01uTGNwY1dnS2c9PSIsInZhbHVlIjoicHR1YnU5d29hRGNcL29pZFhJcTMrZDdJS2RBRTNnbWU4T3NXOVVpbFB3Y0tQaXV3c3FtK0pxMmJhRDBLNnVWS1IiLCJtYWMiOiJmNDllYWFkN2RlODk4ZTg1Nzc0OTQ0OWVjN2YzMjVhMGIzN2ZkOTI3YTc1NTk4MDQyYWJhYjIzN2M0NTExODlmIn0%3D |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
banking.volksbank.at
cdnjs.cloudflare.com
lihi3.cc
thirsty-dhawan.91-218-65-223.plesk.page
upload.wikimedia.org
use.fontawesome.com
193.110.183.206
2606:4700::6811:190e
2606:4700:e2::ac40:850f
2620:0:862:ed1a::2:b
2a00:1450:4001:830::200a
35.244.149.249
91.218.65.223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