nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com
Open in
urlscan Pro
54.146.159.4
Malicious Activity!
Public Scan
Submission: On December 06 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 27th 2023. Valid for: 3 months.
This is the only time nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MitID (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 54.146.159.4 54.146.159.4 | 14618 (AMAZON-AES) (AMAZON-AES) | |
13 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-146-159-4.compute-1.amazonaws.com
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
openshiftapps.com
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com |
48 KB |
0 |
mitid.dk
Failed
www.mitid.dk Failed |
|
13 | 2 |
Domain | Requested by | |
---|---|---|
5 | nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com |
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com
|
0 | www.mitid.dk Failed |
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
api.sandbox-m3.1530.p1.openshiftapps.com R3 |
2023-10-27 - 2024-01-25 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/
Frame ID: 55F1EAB8CCB3C2ABE0B4E73DC02AD2B9
Requests: 12 HTTP requests in this frame
Frame:
https://nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/MitID_files/sso-client.html
Frame ID: 6BFAE7BE2199C6406BA0835D7C2E1AEC
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/ |
47 KB 47 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/MitID_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrapper.a29ccd9579584e71dfba.js.download
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/MitID_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
coreclient.fc073d0434d8c90092cf.js.download
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/MitID_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sso-client.html
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/MitID_files/ Frame 6BFA |
196 B 374 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Bold.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Medium.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-SemiBold.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Bold.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-SemiBold.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Medium.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Bold.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Medium.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-SemiBold.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Bold.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-SemiBold.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Medium.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MitID (Government)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com/ | Name: d3d675c48ace1a28f2f9cfd6b3ecc4c2 Value: 086359236d1b60cb8ea9056097bafa04 |
21 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nemapp-netapp-marina87-a1t-dev.apps.sandbox-m3.1530.p1.openshiftapps.com
www.mitid.dk
www.mitid.dk
54.146.159.4
80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880
e59200f8a6dec02de3f95ee22ee6682b1e93820b3f3f7d105bc02a4b9f750629